31
Who is the adversary? The difference between shoulder surfers at ATMs and smartphones Oliver Wiese Joint work with Volker Roth Freie Universit¨ at Berlin [email protected]

Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Who is the adversary?The difference between shoulder surfers at

ATMs and smartphones

Oliver Wiese

Joint work with Volker Roth • Freie Universitat Berlin •[email protected]

Page 2: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

THE ORIGINS OFSHOULDER SURFING

Page 3: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• One observation of one random person• Opportunistic observer (OO)

Page 4: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

10 years of studying shoulder surfing resistance

Page 5: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Basic experimental setup:

• Cast participants into the roles of users and adversaries• Simulate a small number of authentication sessions• Ask adversaries for the PIN• Count successes

Roth et al., De Luca et al., von Zezschwitz et al., Kim et al. and others. . .

Page 6: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

AUTHENTICATION INCRYPTOGRAPHY

Page 7: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Formal setup:

• Rigorous and precise definitions• Precisely state unproven assumptions• Rigorous proof of security

Hopper and Blum, Lamport, Yan et al., Katz and Lindell, . . .

Page 8: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

COMPARSION OFMODELS

Page 9: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Method HCI-SEC CryptoType empirical formal

Adversary human algorithmObservations single multiple

Mechanism HCI-SEC CryptoSecurity low highUsability fair bad

Page 10: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

SMARTPHONES ANDINSIDERS

Muslukhov et al.

Page 11: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Capabilities and limitations:1. Undetectable access2. Human partial observations3. Multiple observations

Page 12: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

PARTIAL OBSERVATIONS

Page 13: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

User’s PIN: 3548

1.

1 2 34 5 67 8 9

0

Secure in the OO model (two missing)Pr[success] = 1/100

2.

1 2 34 5 67 8 9

0

Limited security in insider model (5 is duplicate)Pr[success] = 1/10

3.

1 2 34 5 67 8 9

0

Insecure in insider model (all digits known)Pr[success] = 1

Page 14: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

User’s PIN: 3548

1.

1 2 34 5 67 8 9

0

Secure in the OO model (two missing)Pr[success] = 1/100

2.

1 2 34 5 67 8 9

0

Limited security in insider model (5 is duplicate)Pr[success] = 1/10

3.

1 2 34 5 67 8 9

0

Insecure in insider model (all digits known)Pr[success] = 1

Page 15: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

User’s PIN: 3548

1.

1 2 34 5 67 8 9

0

Secure in the OO model (two missing)Pr[success] = 1/100

2.

1 2 34 5 67 8 9

0

Limited security in insider model (5 is duplicate)Pr[success] = 1/10

3.

1 2 34 5 67 8 9

0

Insecure in insider model (all digits known)Pr[success] = 1

Page 16: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

User’s PIN: 3548

1.

1 2 34 5 67 8 9

0

Secure in the OO model (two missing)Pr[success] = 1/100

2.

1 2 34 5 67 8 9

0

Limited security in insider model (5 is duplicate)Pr[success] = 1/10

3.

1 2 34 5 67 8 9

0

Insecure in insider model (all digits known)Pr[success] = 1

Page 17: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

HOW CAN WE STUDYSECURITY?

Page 18: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• Enumerate and rank partial observations• Determine feasible observations

⇒ empirical study

• Simulate adversary based on observations⇒ analysis of algorithm

Wiese and Roth

Page 19: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

Method HCI-SEC Crypto InsidersType empirical formal both

Adversary human algorithm bothObservations single multiple multiple

Mechanism HCI-SEC Crypto InsidersSecurity low high realisticUsability fair bad ?

Page 20: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

(IN-)SECURITYPRINCIPLES

Page 21: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

FIXED GRID

Page 22: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• Observe only input• PIN digits independent⇒ single attacks⇒

small space (4 · 10 instead of 104)

Page 23: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

CHALLENGE ANDRESPONSE

Page 24: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• Observe challenge and response⇒ partial observations!

⇒ Choose and verify attack

Example: SwiPIN (2015) insecure after 6observations

Page 25: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

AMBIGUOUSOBSERVATIONS

Page 26: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• We can only reject and not accept an item⇒ Repeat observations to exclude items

⇒ Choose and reject attack

Example: PressureFACE (2010), CognitiveTrapdoor (2004) ≥ 20 obs.

Page 27: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• Only feedback without choosing item• Count frequency for possible items• Select item with highest frequency

⇒ Frequency attackExample: PressureFACE (2010), Cognitive

Trapdoor (2004) ≥ 100 obs.

Page 28: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• Hidden channels: GlassUnlock (2015)• False response: Hopper & Blum (2001)

⇒ Increase security

Page 29: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

WRAPPING UP

Page 30: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

• More usable but less secure• Partial observations are powerful

• Formal security analysis in design process

Page 31: Who is the adversary?privacyworkshop.qu.tu-berlin.de/wp-content/uploads/2015/07/who_is… · One observation of one random person Opportunistic observer (OO) 10 years of studying

QUESTIONS?