Top Banner
Jeremy Clark thenticating under duress Urs Hengartner Panic Passwords:
43

HotSec 2008 Presentation

Jun 12, 2015

Download

Technology

Jeremy Clark

"Panic Passwords: Authenticating under Duress" by Jeremy Clark and Urs Hengartner (University of Waterloo)
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HotSec 2008 Presentation

Jeremy ClarkAuthenticating under duress Urs Hengartner

Panic Passwords:

Page 2: HotSec 2008 Presentation

© Universal Pictures International 2007. Used under the fair dealings clause in the Canada Copyright Act.

Page 3: HotSec 2008 Presentation

Outline

1. Definitions2. Threat Model:– Dimensions– Assumptions

3. Categories of Attacks4. Concluding Remarks

Page 4: HotSec 2008 Presentation

Definitions

Password Space

Page 5: HotSec 2008 Presentation

Definitions

Password Space

Regular

Page 6: HotSec 2008 Presentation

Definitions

Password Space

Regular

Panic

Page 7: HotSec 2008 Presentation

Definitions

Password Space

Regular

Panic

Invalid

Page 8: HotSec 2008 Presentation

literature review

Page 9: HotSec 2008 Presentation

Literature Review

No thorough attention from the academic community

Off-the-shelf alarm systems have built in panic passwords

Some patents have panic passwords as a component

They use a basic scheme with limited applicability

Page 10: HotSec 2008 Presentation

a threat model

Page 11: HotSec 2008 Presentation

Participants

Alice: subject entering her password

Bob: entity receiving Alice’s password

Oscar: adversary coercing Alice

Assume Bob is trustworthy and not in collusion with Oscar

Page 12: HotSec 2008 Presentation

Assumptions

1. Kerckhoffs' principle: Oscar knows system

2. Observational principle: Oscar sees password entered

3. Iteration principle: Multiple authentications can be forced

4. Forced-randomization principle: Oscar can control the order of passwords to be entered

Page 13: HotSec 2008 Presentation

Parameter 1: Coercion

Oscar threatens Alice with retribution if he can determine that Alice entered a panic password

Called a screening attack or blackmail

Page 14: HotSec 2008 Presentation

Parameter 1: Coercion

If Oscar cannot tell if Alice enters a panic password, then Alice cannot prove to him, for money, that she is entering a regular password

Called signalling or bribery$

Page 15: HotSec 2008 Presentation

Parameter 2: Persistence

Oscar could be persistent in his attack

Oscar could have a limited timeframe in which to conduct his attack and thus be non-persistent

Persistent

Non-persistent

Page 16: HotSec 2008 Presentation

Parameter 3: Bob’s Action

Bob could take some server-side, unobserved reaction upon receiving a panic password

Bob could respond differently to Alice—a difference that could be observed by Oscar

AB

B Unobservable Reaction

Observable Response

Page 17: HotSec 2008 Presentation

Parameter 4: Oscar’s Goal

Oscar may want to prevent a panic password from being entered at all

Oscar may not care if a panic password is entered, as long as a regular password is entered at some point

Page 18: HotSec 2008 Presentation

some categories of attacks

Page 19: HotSec 2008 Presentation

Unrecoverable reactions

B $

Page 20: HotSec 2008 Presentation

Unrecoverable reactions

Oscar wants to gain entry to a premise secured with an alarm

Alice can deactivate the alarm with a password

If Alice uses a panic password, the authorities are alerted

B $

Page 21: HotSec 2008 Presentation

2P System

Password Space

Regular

Panic

Invalid

Page 22: HotSec 2008 Presentation

Unrecoverable reactions

B $

Page 23: HotSec 2008 Presentation

Non-Persistent Attacks

ABB $

Page 24: HotSec 2008 Presentation

Non-Persistent Attacks

An ATM issues marked bills if a panic PIN is entered

Oscar can tell the difference after analysing the bills—thus he wants to escape with at least some unmarked bills

ABB $

Page 25: HotSec 2008 Presentation

Non-Persistent Attacks

ABB $

Page 26: HotSec 2008 Presentation

2P-Lock System

Password Space

Regular

Panic

Invalid

Page 27: HotSec 2008 Presentation

2P-Lock System

Within a window of time:

No Lock

Lock upon second password

Lock upon second password

No Lock

Page 28: HotSec 2008 Presentation

2P-Lock System

Within a window of time:

No Lock

Lock upon second password

Lock upon second password

No Lock

Different set of bills

Same behaviour

Page 29: HotSec 2008 Presentation

Persistent Attacks

ABB$

Page 30: HotSec 2008 Presentation

Persistent Attacks

An online voting system spoils any ballots that are cast using a panic password

Oscar should not be able to coerce Alice’s vote, nor should Alice be able to verifiably sell her vote to Oscar

ABB$

Page 31: HotSec 2008 Presentation

Persistent Attacks

ABB$

Page 32: HotSec 2008 Presentation

P-Compliment System

Password Space

Regular

Panic

Page 33: HotSec 2008 Presentation

P-Compliment System

Password Space

Regular

Panic

Page 34: HotSec 2008 Presentation

Password Space

Regular

Panic

Invalid

Page 35: HotSec 2008 Presentation

Password Space

Regular

Panic

Invalid

Page 36: HotSec 2008 Presentation

Alice knows: 1 regular and 1 rule for separating panic from invalid

Regular

Panic

Invalid

Page 37: HotSec 2008 Presentation

A System

ABB$

Page 38: HotSec 2008 Presentation

concluding remarks

Page 39: HotSec 2008 Presentation

Future Directions

Expand the parameters for the threat model

Find new rules for unlimited panic passwords

A password exchange protocol that can distinguish regular, panic, and invalid passwords (given they will be hashed/MACed)

Usability studies!

Page 40: HotSec 2008 Presentation

Concluding Remarks

Page 41: HotSec 2008 Presentation

Questions?

Page 42: HotSec 2008 Presentation
Page 43: HotSec 2008 Presentation

Title

Body

ABB $