SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

被引:18
|
作者
Krawiecka, Klaudia [1 ]
Kurnikov, Arseny [1 ]
Paverd, Andrew [1 ]
Mannan, Mohammad [2 ]
Asokan, N. [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Concordia Univ, Montreal, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Passwords; Phishing; Intel SGX; Trusted Execution Environment;
D O I
10.1145/3178876.3186101
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-performing all competing solutions in terms of deployability (e.g. cost and compatibility). However, two critical security concerns are phishing and theft of password databases. These are exacerbated by users' tendency to reuse passwords across different services. Current solutions typically address only one of the two concerns, and do not protect passwords against rogue servers. Furthermore, they do not provide any verifiable evidence of their (server-side) adoption to users, and they face deployability challenges in terms of ease-of-use for end users, and/or costs for service providers. We present SafeKeeper, a novel and comprehensive solution to ensure secrecy of passwords in web authentication systems. Unlike previous approaches, SafeKeeper protects users' passwords against very strong adversaries, including external phishers as well as corrupted (rogue) servers. It is relatively inexpensive to deploy as it (i) uses widely available hardware-based trusted execution environments like Intel SGX, (ii) requires only minimal changes for integration into popular web platforms like WordPress, and (iii) imposes negligible performance overhead. We discuss several challenges in designing and implementing such a system, and how we overcome them. Via an 86-participant user study, systematic analysis and experiments, we show the usability, security and deployability of SafeKeeper, which is available as open-source.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 50 条
  • [41] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
    Machiry, Aravind
    Gustafson, Eric
    Spensky, Chad
    Salls, Chris
    Stephens, Nick
    Wang, Ruoyu
    Bianchi, Antonio
    Choe, Yung Ryn
    Kruegel, Christopher
    Vigna, Giovanni
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [42] A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments
    Asvadishirehjini, Aref
    Kantarcioglu, Murat
    Malin, Bradley
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 138 - 147
  • [43] IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments
    Contiu, Stefan
    Pires, Rafael
    Vaucher, Sebastien
    Pasin, Marcelo
    Felber, Pascal
    Reveillere, Laurent
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 207 - 218
  • [44] Profiling with trust: system monitoring from trusted execution environments
    Christian Eichler
    Jonas Röckl
    Benedikt Jung
    Ralph Schlenk
    Tilo Müller
    Timo Hönig
    Design Automation for Embedded Systems, 2024, 28 : 23 - 44
  • [45] Universal Trusted Execution Environments for Securing SDN/NFV Operations
    Lefebvre, Vincent
    Santinelli, Gianni
    Mueller, Tilo
    Goetzfried, Johannes
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [46] How trusted execution environments fuel research on microarchitectural attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE Security and Privacy, 2020, 18 (05): : 18 - 27
  • [47] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS
    Stancu, Florin-Alexandru
    Mircea, Alexandru-Alin
    Rughiniș, Răzvan
    Chiroiu, Mihai
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2022, 84 (02): : 3 - 14
  • [48] Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats
    Lacoste, Marc
    Lefebvre, Vincent
    IEEE SECURITY & PRIVACY, 2023, 21 (03) : 37 - 46
  • [49] Profiling with trust: system monitoring from trusted execution environments
    Eichler, Christian
    Roeckl, Jonas
    Jung, Benedikt
    Schlenk, Ralph
    Mueller, Tilo
    Hoenig, Timo
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2024, 28 (01) : 23 - 44
  • [50] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Froehlich, Antonio Augusto
    Horstmann, Leonardo Passig
    Hoffmann, Jose Luis Conradi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)