Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
GENÇ, Ziya Alper; LENZINI, Gabriele; RYAN, Peter et al.
2018In Proceedings of the 4th International Conference on Information Systems Security and Privacy
Peer reviewed
 

Documents


Texte intégral
ICISSP_2018_40.pdf
Postprint Auteur (235.1 kB)
Télécharger

The original contribution was presented at ICISSP 2018 (http://www.icissp.org/).


Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Honeywords; Password-based Authentication; Secure Protocols Design; Formal Analysis
Résumé :
[en] In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
GENÇ, Ziya Alper ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
LENZINI, Gabriele  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
RYAN, Peter ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
VAZQUEZ SANDOVAL, Itzel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Date de publication/diffusion :
2018
Nom de la manifestation :
4th International Conference on Information Systems Security and Privacy
Date de la manifestation :
22-24 January 2018
Manifestation à portée :
International
Titre de l'ouvrage principal :
Proceedings of the 4th International Conference on Information Systems Security and Privacy
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
URL complémentaire :
Disponible sur ORBilu :
depuis le 02 novembre 2017

Statistiques


Nombre de vues
451 (dont 55 Unilu)
Nombre de téléchargements
414 (dont 19 Unilu)

citations Scopus®
 
5
citations Scopus®
sans auto-citations
3
OpenCitations
 
7
citations OpenAlex
 
7

Bibliographie


Publications similaires



Contacter ORBilu