Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
GENÇ, Ziya Alper; LENZINI, Gabriele; RYAN, Peter et al.
2019In Information Systems Security and Privacy
Peer reviewed
 

Documents


Texte intégral
document.pdf
Postprint Auteur (276.84 kB)
Télécharger

The original publication is part of the Communications in Computer and Information Science (CCIS) book series published by Springer and it is available at https://doi.org/10.1007/978-3-030-25109-3_7


Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
honeywords; password-based authentication; secure protocols design; formal security analysis
Résumé :
[en] Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and Rivest introduced the Honeywords System in 2013. The core idea is to store the password with a list of decoy words that are ``indistinguishable'' from the password, called honeywords. An adversary that obtains the password file and, by dictionary attack, retrieves the honeywords can only guess the password when attempting to log in: but any incorrect guess will set off an alarm, warning that file has been compromised. In a recent conference paper, we studied the security of the Honeywords System in a scenario where the intruder also manages to corrupt the server's code (with certain limiting assumptions); we proposed an authentication protocol and proved it secure despite the corruption. In this extended journal version, we detail the analysis and we extend it, under the same attacker model, to the other two protocols of the original Honeywords System, the setup and change of password. We formally verify the security of both of them; further, we discuss that our design suggests a completely new approach that diverges from the original idea of the Honeywords System but indicates an alternative way to authenticate users which is robust to server's code-corruption.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
GENÇ, Ziya Alper ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
LENZINI, Gabriele  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
RYAN, Peter ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
VAZQUEZ SANDOVAL, Itzel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
Date de publication/diffusion :
juillet 2019
Nom de la manifestation :
4th International Conference, ICISSP 2018, Revised Selected Papers
Lieu de la manifestation :
Funchal - Madeira, Portugal
Date de la manifestation :
January 22-24, 2018
Manifestation à portée :
International
Titre de l'ouvrage principal :
Information Systems Security and Privacy
Maison d'édition :
Springer International Publishing, Cham, Inconnu/non spécifié
ISBN/EAN :
978-3-030-25109-3
Collection et n° de collection :
Communications in Computer and Information Science, Volume 977
Pagination :
125-151
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Disponible sur ORBilu :
depuis le 24 août 2019

Statistiques


Nombre de vues
313 (dont 11 Unilu)
Nombre de téléchargements
437 (dont 7 Unilu)

citations Scopus®
 
3
citations Scopus®
sans auto-citations
3
OpenCitations
 
4
citations OpenAlex
 
4

Bibliographie


Publications similaires



Contacter ORBilu