15
S AKSHI J AIN, LINKEDIN N EIL G ONG, UC B ERKELEY S REYA B ASUROY, PRINCETON J UAN L ANG, G OOGLE P ROF. D AWN S ONG, UC B ERKELEY P RATEEK M ITTAL, P RINCETON New Directions in Social Authentication 1 USEC 2015

New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

S A K S H I J A I N , L I N K E D I N N E I L G O N G , U C B E R K E L E Y

S R E Y A B A S U R O Y , P R I N C E T O N J U A N L A N G , G O O G L E

P R O F . D A W N S O N G , U C B E R K E L E Y P R A T E E K M I T T A L , P R I N C E T O N

New Directions in Social Authentication

1

USEC 2015

Page 2: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Shortcomings in commonly used authentication systems

USEC 2015

2

Passwords: •  Same across websites •  Prone to dictionary attacks •  Do not tend to change with time

Secret Questions: •  Users forget the answers to difficult

questions •  Answers do not tend to change with time

Page 3: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

USEC 2015

3

Two Factor Authentication

•  Security better than previous two but very inconvenient

Shortcomings in commonly used authentication systems

Page 4: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Social Authentication

USEC 2015

4

Using information from a user’s social network to authenticate him/her

•  Prone to attacks that employ face recognition attacks [ACSAC ‘12] I. Polalkis, et al. "All your face are belong to us: breaking Facebook's social authentication”

•  Attacks by user’s friends [FC ’12] H. Kim, et. al. “Social authentication: Harder than it looks”

Page 5: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Contributions

USEC 2015

5

Information in a user’s social network is ever changing! Can we use this to get rid of static nature of secrets? �  Rethink the space of social authentication challenges beyond

photographs and provide a systematic way to explore the same �  Proof-of-concept implementation on Facebook users �  Pilot user study and usability evaluation of the Facebook prototype

Page 6: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

USEC 2015 6

Challenge Format: Given some criteria, identify the connection that matches it

Page 7: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Desirable properties of a challenge

Usability: Reliability: Pr [true user can correctly solve the challenge] Applicability: Pr [at least one connection matches the challenge

criteria]

Security: Pr [attacker is able to correctly solve the challenge]

7

USEC 2015

Page 8: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Edge e.g., message

comment poke

Pseudo-edge e.g., group

school

Node e.g., photo

hometown

message/ comment/

poke

8

USEC 2015

group/ school

photo

Page 9: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Facebook Prototype

USEC 2015

9

Page 10: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Facebook Prototype

USEC 2015

10

Question Type Name the friend tagged in the photo Node

Name the friend you went to same school with Pseudo-edge

Name the friend you recently poked Edge

Name the friend you recently sent a message Edge

Answer Format: Type in the name of a matching connection (edit distance used to accommodate for spelling errors)

Page 11: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

User Study

USEC 2015

11

Number of participants: 90 Recruitment:

Amazon Mechanical Turk $5 on completing the survey

Age distribution:

18-24 42% 25-34 39% 35+ 19%

Page 12: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Usability Results of Prototype

Type Question Reliability Applicability Node Friend tagged in the photo 28% ±9% 77% ± 8% Pseudo-edge Friend you went to same school with 54% ± 10% 51% ± 10% Edge Friend you recently poked 71% ± 9% 48% ± 10% Edge Friend you recently sent a message 66% ± 10% 98% ± 2%

12

USEC 2015

Page 13: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Future Work

USEC 2015

13

�  Results are skewed by selection of question criteria. Design a broader set of questions within each category

�  Compare our prototype with Facebook’s existing social authentication system

�  Compare usability and security of various answer types

¡  Text box without options ¡  Radio buttons

Page 14: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Discussion

USEC 2015

14

�  Replacing passwords? ¡  Proposed model is intended to be an auxiliary authentication

mode, not a primary one �  Privacy Implications:

¡  Leakage of information like message exchanges ¡  Note that user is confirmed via primary authentication

�  Security: ¡  Depends on user’s privacy ¡  Edge > Pseudo-edge > Node

Page 15: New Directions in Social Authentication€¦ · Social Authentication USEC 2015 4 Using information from a user’s social network to authenticate him/her • Prone to attacks that

Questions?

15 USEC 2015