SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

被引:18
|
作者
Krawiecka, Klaudia [1 ]
Kurnikov, Arseny [1 ]
Paverd, Andrew [1 ]
Mannan, Mohammad [2 ]
Asokan, N. [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Concordia Univ, Montreal, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Passwords; Phishing; Intel SGX; Trusted Execution Environment;
D O I
10.1145/3178876.3186101
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-performing all competing solutions in terms of deployability (e.g. cost and compatibility). However, two critical security concerns are phishing and theft of password databases. These are exacerbated by users' tendency to reuse passwords across different services. Current solutions typically address only one of the two concerns, and do not protect passwords against rogue servers. Furthermore, they do not provide any verifiable evidence of their (server-side) adoption to users, and they face deployability challenges in terms of ease-of-use for end users, and/or costs for service providers. We present SafeKeeper, a novel and comprehensive solution to ensure secrecy of passwords in web authentication systems. Unlike previous approaches, SafeKeeper protects users' passwords against very strong adversaries, including external phishers as well as corrupted (rogue) servers. It is relatively inexpensive to deploy as it (i) uses widely available hardware-based trusted execution environments like Intel SGX, (ii) requires only minimal changes for integration into popular web platforms like WordPress, and (iii) imposes negligible performance overhead. We discuss several challenges in designing and implementing such a system, and how we overcome them. Via an 86-participant user study, systematic analysis and experiments, we show the usability, security and deployability of SafeKeeper, which is available as open-source.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 50 条
  • [1] Using SafeKeeper to Protect Web Passwords
    Kurnikov, Arseny
    Krawiecka, Klaudia
    Paverd, Andrew
    Mannan, Mohammad
    Asokan, N.
    COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 159 - 162
  • [2] Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Tran, Muoi
    Luu, Loi
    Kang, Min Suk
    Bentov, Iddo
    Saxena, Prateek
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
  • [3] DELEGATEE: Brokered Delegation Using Trusted Execution Environments
    Matetic, Sinisa
    Schneider, Moritz
    Miller, Andrew
    Juels, Ari
    Capkun, Srdjan
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403
  • [4] A framework for application partitioning using trusted execution environments
    Atamli-Reineh, Ahmad
    Paverd, Andrew
    Petracca, Giuseppe
    Martin, Andrew
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [5] Graviton: Trusted Execution Environments on GPUs
    Volos, Stavros
    Vaswani, Kapil
    Bruno, Rodrigo
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
  • [6] Secure and Efficient Mobile DNN Using Trusted Execution Environments
    Hu, Bin
    Wang, Yan
    Cheng, Jerry
    Zhao, Tianming
    Xie, Yucheng
    Guo, Xiaonan
    Chen, Yingying
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
  • [7] Time to Rethink: Trust Brokerage Using Trusted Execution Environments
    Koeberl, Patrick
    Phegade, Vinay
    Rajan, Anand
    Schneider, Thomas
    Schulz, Steffen
    Zhdanova, Maria
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 181 - 190
  • [8] Building Open Trusted Execution Environments
    Kohlbrenner, David
    Shinde, Shweta
    Lee, Dayeol
    Asanovic, Krste
    Song, Dawn
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 47 - 56
  • [9] MultiTEE: Distributing Trusted Execution Environments
    Ott, Simon
    Orthen, Benjamin
    Weidinger, Alexander
    Horsch, Julian
    Nayani, Vijayanand
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1617 - 1629
  • [10] Secret Sharing in Pub/Sub Using Trusted Execution Environments
    Munster, Javier
    Jacobsen, Hans-Arno
    DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, : 28 - 39