BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 6262 Spring 2009
Advertisements

FI-WARE Testbed Access Control temporary solution.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Internet Security Protocols
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Administrative  Philosophy  Class survey  Grading  Proposal (5 points max)  Small projects (10 points each max)  Project (40 points max)  Presentation.
Phishing – Read Behind The Lines Veljko Pejović
Administrative  Philosophy  Class survey  Grading  Project  Presentation.
Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Georgy Melamed Eran Stiller
Varun Sharma Security Engineer | ACE Team | Microsoft Information Security
Chapter 10 Publishing and Maintaining Your Web Site.
Norman SecureSurf Protect your users when surfing the Internet.
1 Web Developer & Design Foundations with XHTML Chapter 6 Key Concepts.
Server-side Scripting Powering the webs favourite services.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
JavaScript, Fourth Edition
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Identity on Force.com & Benefits of SSO Nick Simha.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
Chapter 8 Cookies And Security JavaScript, Third Edition.
JavaScript – Quiz #9 Lecture Code:
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
WESS Application System PKI Login Registration Process.
NMD202 Web Scripting Week3. What we will cover today Includes Exercises PHP Forms Exercises Server side validation Exercises.
Prof Frankl, Spring 2008CS Polytechnic University 1 Overview of Web database applications with PHP.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
Exploring Office 2003 – Grauer and Barber HTML And Basic Web page.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Browser User Certificate Mail Box VOMS-Admin Host Tomcat TR1) Users Trusts “VOMS-Admin” server identity. step1 TR2) User Trusts data (Data1, HTML response)
SMash : Secure Component Model for Cross- Domain Mashups on Unmodified Browsers WWW 2008 Frederik De Keukelaere et al. Presenter : SJ Park.
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
THE DEVIL IS IN THE (IMPLEMENTATION) DETAILS: AN EMPIRICAL ANALYSIS OF OAUTH SSO SYSTEMS SAN-TSAI SUN & KONSTANTIN BEZNOSOV PRESENTED BY: NAZISH KHAN COMPSCI.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Securing Angular Apps Brian Noyes
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
MassHealth Medicaid Management Information System (MMIS) Provider Online Service Center (POSC) Technical Upgrade January 13, 2016.
Configuring and Deploying Web Applications Lesson 7.
AJAX Use Cases for WSRP Subbu Allamaraju BEA Systems Inc WSRP F2F Meeting, May 2006.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
WESS Application System PKI Login Registration Process
Tonga Institute of Higher Education IT 141: Information Systems
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
API Security Auditing Be Aware,Be Safe
Subbu Allamaraju BEA Systems Inc
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
MIT GSL 2018 week 1 | day 4 Introduction to Web Development II.
WESS Application System PKI Login Registration Process
Tonga Institute of Higher Education IT 141: Information Systems
Multi-Factor Authentication
Powerschool for Parents
Tonga Institute of Higher Education IT 141: Information Systems
User Registration.
WESS Application System PKI Login Registration Process
WESS Application System PKI Login Registration Process
WESS Application System PKI Login Registration Process
Wireless Spoofing Attacks on Mobile Devices
Cross Site Request Forgery (CSRF)
Presentation transcript:

BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park

Table of Contents  Introduction  Goals  BeamAuth Basic  BeamAuth Protocol  Example  Attacks  Summary 2

Web Authentication Security  Passive Sniffing  Attack caused by insecure wi-fi AP, unswitched local wired networks, or corporate proxies  Social Engineering  Technique based on specific attribute of human decision-making  Example : Phishing, Pharming  Desktop compromise  Desktop PC compromised with malware  Zero guarantee of any security Introduction 1/2 3

Fragment Identifier  Purpose  Used to designate a portion of a page  Web browsers scroll to the appropriate location.  Example   Characteristics  Web browsers never send it over the network.  Page is not reloaded during navigation between fragment identifiers. Introduction 2/2 4

Goals  Safely remaining credentials against many type of phishing attack (Social Engineering)  Only requiring server-side deployment  Building better security in the application layer 5

URL Fragment Identifier  The resolution of a fragment identifier  Example :  Procedure  Connecting to host hostname on port 80  Requesting /rest/of/url and rendering the HTML page  Scrolling the viewport to the position indicated by fragment_id if it exists  Fragment ID is never sent over the network.  Navigation  Navigation between fragments within the same URL does not cause a page reload. BeamAuth Basic 1/2 6

JavaScript Features  Variable and method for fragments  JavaScript variable for the fragment identifier  Window.location.hash  Updating the URL  Window.location.replace()  Source Code var hash = document.location.hash; if( hash != ‘’ ) { // parse the hash, get username and token parse_beamauth_hash( hash ); // clear the hash from the URL document.location.replace( ‘/login’ ); } BeamAuth Basic 2/2 7

General Idea BeamAuth Protocol 1/4 8

Setup Phase  Registering ID and password  Authenticating a user by using a second channel authentication mechanism like an mail-back  Clicking on this verification URL in  Example  Web page which user reaches provides her with a link.  Adding the link as a bookmark   bookmark_link.href = ‘ + window.location.hash; BeamAuth Protocol 2/4 9

Re-Initialization  When is Re-Initialization required?  Deleting user’s BeamAuth bookmark by mistake  Using several web browsers  Using multiple computers  Solutions  Instructing a user to keep the signup  Using bookmark synchronization tools BeamAuth Protocol 3/4 10

Mechanism  How to hide a token from users  A BeamAuth login page contains JavaScript.  This script regularly polls the value of fragment ID.  After reading it, the poller updates the URL by calling replace().  How to use a token for authentication  HMAC the password with the secret token.  Login page securely submits this resulting credential to the server. BeamAuth Protocol 4/4 11

Registration Example 1/7 12

Second Channel Authentication Example 2/7 13

Setting Up a Bookmark Example 3/7 14

Adding a Bookmark Example 4/7 15

BeamAuth Authentication Example 5/7 16

Inputting a Password Example 6/7 17

Authentication Completion Example 7/7 18

Attacks (1/2)  Phishing with a deceitful URL  In case of unsophisticated phishing attack  Password is compromised, and token is safe.  Overriding page unload  User can no longer login, but token is safe.  Malicious bookmark replacement  Using a spoofed  Token and password are safe.  Explicit bookmark theft  Token is compromised, and password can be compromised via phishing. 19

Attacks (2/2)  Attacking the account  Token is compromised, and password can be compromised via phishing.  Using the victim’s computer  Token is compromised, and password can be compromised via phishing.  Pharming inattentive users  Sending down malicious code that reads fragment ID  All compromised  Malware and client compromise  All compromised 20

Summary  The BeamAuth uses  Bookmark as the second authentication factor.  Token delivered via a separate channel. ( )  Fragment identifier to store token. 21