“Stronger” Web Authentication: A Security Review Cory Scott.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Achieving online trust through Mutual Authentication.
Selecting a Strong Authentication Solution Scott Mackelprang, V.P. of Security Digital Insight.
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Challenges of Identity Fraud Chris Voice, VP Technology.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Access Control Methodologies
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
The State of Security Management By Jim Reavis January 2003.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Using Digital Credentials On The World-Wide Web M. Winslett.
Delayed Password Disclosure Mutual Authentication to Fight Phishing Steve Myers Indiana University, Bloomington Joint work with: Markus Jakobsson Indiana.
The OWASP Foundation OWASP Chennai Phishing.
The Office of Information Technology Two-Factor Authentication.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
OASIS Trust Elevation Elevate Trust in Electronic Identities Abbie Barbir, Ph.D Co-Chair OASIS Trust Elevation TC.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission.
Origins, Cookies and Security – Oh My! John Kemp, Nokia Mobile Solutions.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
Web Application Security Presented by Ben Lake. How the Web Works Hypertext Transfer Protocol (HTTP)  Application-level  Stateless Example  Web Browser.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
OASIS Trust Elevation Elevate Trust in Electronic Identities Gershon Janssen, Member OASIS Trust Elevation TC
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Millions of Dollars Lost. MAN IN THE BROWSER. TABLE OF CONTENTS Introduction Brief Examples of Man in the middle Defining MitB From Infection to Pay Day.
Information Management System Ali Saeed Khan 29 th April, 2016.
Modern User and Device Authentication  Biometric Fingerprints: Moving beyond Login  TPM Key Attestation: Binding a user and machine identities  Strong.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Chapter One: Mastering the Basics of Security
Office 365 Identity Management
Understanding IDENTITY Assurance
Li Yang, Carson Woods (University of Tennessee at Chattanooga
REVISITING DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS Mansour Alsaleh,Mohammad Mannan and P.C van Oorschot.
Unit 8 Network Security.
Presentation transcript:

“Stronger” Web Authentication: A Security Review Cory Scott

Problem Area Username and password are insufficient authenticators for high-value assets accessible via an untrusted network. Pressures: –Regulatory: FFIEC guidance / mandate –Consumer confidence –Financial loss: Phishing and fraudulent activity –Technical: Defense-in-depth for web applications

Authentication As Ceremony: Prior Work Introduced by Walker / Ellison –Model for protocols involving users as opposed to machines Authentication Mechanism, as defined by Kaliski, contains the following: –Selected authentication factors –Particular evidence about those factors; and a –Specific protocol for conveying the evidence

Authentication As Ceremony: Impact We can adopt compound authentication mechanisms that combine different factors and assign a level of risk to each factor. Example factors: –User credentials –IP Address –ISP / Geo-location –Challenge questions –Access device –Prior suspicious activity on any of the factors –Certificates –OTP tokens / scratch cards –Voice confirm / SMS messages –Nature or Business Impact of request As a result, we can have “risk-based authentication”.

Two-factor Too Much Consumer acceptance of traditional commercial two-factor solutions in the US untested and expensive. Industry Solutions: –Mutual authentication (watermarking / HA SSL certs) –Introduction of “soft” factors: Challenge questions Device identification Geolocation / IP Risk Profiling –Application of risk-based authentication decisions based on the above factors. (Note: Value, in terms of cost or risk reduction, has not been proven yet.)

Factors in Risk-Based Authentication Device Identification –Signed Key of (Browser + OS + Language + Time Zone) + Specific User Account –Can be mapped to particular IP, ISP, Country –Stored as HTTP Cookie and/or Flash Shared Object Geolocation / IP Risk Profiling –Behavioral analysis of user login activity –Blacklist or flag certain countries, ISPs –Subscribe to a “fraud network” Transaction-level analysis –Anomalous transaction activity increases risk profile In all of these cases, when a risk threshold has been breached, the application can force “stronger” authentication.

Second-Level Authentication Decisions Challenge questions or other Knowledge- Based schemes SMS messages as One Time Passwords Voice or Registered Telephone verification verification Access from previously registered device Fall-back to 2FA: Smart-cards, Physical OTP tokens, biometrics, etc.

Credential Disclosure: Threat Models Shoulder-Surf or The “Post-It” Debacle Keyloggers, Malicious Browser Helper Objects, and Rootkits –Differing Impact: Interactive vs. Harvesting Mode –Can the attacker generate traffic from the victim host? Man-in-the-Middle Phishing Sites (trust subversion / trickery) Cross-Site Scripting and Request Forgery and other client-side web vulnerabilities Acquaintance fraud (weakening the credential)

Attack Considerations Tomfoolery with enrollment / site-in-transition –Phishing vectors –Increased site complexity Challenge question fuzzy logic Can the phisher ask the challenge questions? Is the device identifier subject to attack?

Design Considerations How tight is the restriction by IP? The conditioning problem: How often do you challenge? Do you want to be married to images and watermarks? Hard to take away. Support issues –Customers struggle or want to expand images –Account lockout / reset gets more complicated