DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security

被引:0
|
作者
Wang, Hua [1 ]
Guo, Yao [1 ]
Chen, Xiangqun [1 ]
机构
[1] Peking Univ, Sch EECS, Inst Software, Key Lab High Confidence Software Technol,Minist E, Beijing, Peoples R China
关键词
D O I
10.1109/HASE.2008.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, password authentication is distributed to each application, so developers have to take countermeasures by themselves to defend passwords against various threats. This requires a great amount of effort, a lot of which is repetitive. The high cost poses a potential hindrance to the adoption of countermeasures. This paper proposes a new reuse-oriented password authentication framework, called Desktop Password Authentication Center (DPAC), to reuse counter-measures among applications, thus reducing the cost of defending passwords against threats. In DPAC, we move the task of authentication, as well as the responsibility for protecting passwords, from applications to a dedicated Authentication Center (AuthCenter), so that countermeasures only need to be taken in AuthCenter and afterwards are reused by all applications. This solution can eliminate a lot of repetitive work and reduce the cost significantly. We demonstrate the feasibility of DPAC by implementing a prototype, in which we migrate the widely used OpenSSH to DPAC and implement two example countermeasures.
引用
收藏
页码:475 / 478
页数:4
相关论文
共 50 条
  • [1] Web Security Improving by using Dynamic Password Authentication
    Pansa, Detchasit
    Chomsiri, Thawatchai
    [J]. NETWORK AND ELECTRONICS ENGINEERING, 2011, 11 : 32 - 36
  • [2] oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
    Sun, Hung-Min
    Chen, Yao-Hsin
    Lin, Yue-Hsun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 651 - 663
  • [3] ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack
    Kassim, Mariam M.
    Sujitha, A.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, : 31 - 34
  • [4] On the security of some password authentication protocols
    Hsieh, BT
    Sun, HM
    Hwang, T
    [J]. INFORMATICA, 2003, 14 (02) : 195 - 204
  • [5] Improving computer security for authentication of users: Influence of proactive password restrictions
    Robert W. Proctor
    Mei-Ching Lien
    Kim-Phuong L. Vu
    E. Eugene Schultz
    Gavriel Salvendy
    [J]. Behavior Research Methods, Instruments, & Computers, 2002, 34 : 163 - 169
  • [6] Improving computer security for authentication of users: Influence of proactive password restrictions
    Proctor, RW
    Lien, MC
    Vu, KPL
    Schultz, EE
    Salvendy, G
    [J]. BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 2002, 34 (02): : 163 - 169
  • [7] PILOTING AUTHENTICATION AND SECURITY SERVICES IN THE PASSWORD PROJECT
    KIRSTEIN, PT
    WILLIAMS, P
    [J]. COMPUTER COMMUNICATIONS, 1994, 17 (07) : 519 - 531
  • [8] A reuse-oriented framework for hierarchical specifications
    Coudert, S
    Le Gall, P
    [J]. ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2000, 1816 : 438 - 453
  • [9] Security Analysis of Three Password Authentication Schemes
    Shim, Kyung-Ah
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2011, 17 (11) : 1623 - 1633
  • [10] Security Analysis of Two Password Authentication Schemes
    Tan, Zuowen
    [J]. EIGHTH INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, PROCEEDINGS, 2009, : 62 - 62