SlideShare a Scribd company logo
1 of 91
1
Knock x Knock: The Design and
Evaluation of a Unified Authentication
System
Eiji Hayashi
Jason I. Hong
Carnegie Mellon University
2
User Authentication
3
Weakest Link
• Passwords is the weakest link in most
of the computer system
3
4
Weakest Link
• Passwords is the weakest link in most
of the computer system
4
“Passwords are broken”
5
6
“every scheme does worse than
passwords on deployability”
[Bonneau 2012]
Bonneau, J., Herley, C., Oorschot, P.C.V., and Stajano, F. The Quest to Replace Passwords: A
Framework for Comparative Evaluation of Web Authentication Schemes. IEEE, 553–567.
7
IcebergAuthentication Scheme
Create Accounts
Generate Passwords
Periodically Update Password
Monitor Accounts
Keep Account Information Updated
Keep Many Accounts
Revoke Accounts
8
Account Management
Authentication Scheme
9
10
Weakest Link
• Passwords is the weakest link in most
of the computer system
10
Password as Backend
Addressing Management
APIs for Automation
11
Concept
12
13
Credential
Management
Client
14
Credential
Management
Client
User
15
Online Service
Device
IoT
User
Credential
Management
Client
16
Online Service
Device
IoT
User
Credentials
Management
Client
Unified
Authentication
Framework
17
Online Service
Device
IoT
User
Credential
Management
Client
Password-Based Authentication
18
Online Service
Device
IoT
User
Credentials
Management
Client
Protocol (UIMP)
19
Online Service
Device
IoT
User
Credentials
Management
Client
User Experience (Knock x Knock)
20
Knock x Knock Screenshots
21
Knock x Knock Basic Features
• Manage all credentials on iPhone
• Password manager for online services
• Knock to unlock Mac
22
Knock to Unlock
• Easy to detect
• Nice semantic meaning
23
Location-Aware Tiered Access Control
Assign each credential to:
Secure
Standard
Quick
Balance usability and
security based on location
Eiji Hayashi et al. 2012. Goldilocks and the two mobile devices: going beyond all-or-
nothing access to a device's applications. SOUPS.
Eiji Hayashi et al. 2013. CASA: context-aware scalable authentication. SOUPS.
24
Location-Aware Tiered Access Control
Trusted Locations Other Locations
Secure Need a master password
Locked after one access
Standard Need a master password
Locked when leaving
Need a master password
Locked after 3 min
Quick Automatically unlocked
Locked when leaving
Need a master password
Locked after 3 min
25
Location-Aware Tiered Access Control
Trusted Locations Other Locations
Secure Need a master password
Locked after one access
Standard Need a master password
Locked when leaving
Need a master password
Locked after 3 min
Quick Automatically unlocked
Locked when leaving
Need a master password
Locked after 3 min
26
Location-Aware Tiered Access Control
Trusted Locations Other Locations
Secure Need a master password
Locked after one access
Standard Need a master password
Locked when leaving
Need a master password
Locked after 3 min
Quick Automatically unlocked
Locked when leaving
Need a master password
Locked after 3 min
27
Location-Aware Tiered Access Control
Trusted Locations Other Locations
Secure Need a master password
Locked after one access
Standard Need a master password
Locked when leaving
Need a master password
Locked after 3 min
Quick Automatically unlocked
Locked when leaving
Need a master password
Locked after 3 min
28
Location-Aware Tiered Access Control
Trusted Locations Other Locations
Secure Need a master password
Locked after one access
Standard Need a master password
Locked when leaving
Need a master password
Locked after 3 min
Quick Automatically unlocked
Locked when leaving
Need a master password
Locked after 3 min
29
Knock x Knock UIMP features
Examples:
• Unlock doors / bike locks / lockers
• Create an account automatically
• Update password periodically
• Reset all passwords by one click
• Receive account activity notifications
30
Knock x Knock Implementation
UniAuth
Client
Online Service
UIMP
Master Password
UniAuth
Proxy BLE
Computer
Online Service Device
Smartphone
UIMPConventional
Login Form
31
32
33
Authenticated
Online Service
Master
Password
UniAuth
Proxy
Computer
Online Service Device
Smartphone
User – Client Authentication
34
35
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
Client – Device Authentication
36
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
Client – Device Authentication
37
38
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
Client – Service Authentication
39
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
URL
Open in a Browser
Client – Service Authentication
40
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
User ID & Pwd
User ID & Pwd
Client – Service Authentication
41
42
43
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
Client De-Authentication
44
Not
Authenticated
Online Service
UniAuth
Proxy
Computer
Online Service Device
Smartphone
Client De-Authentication
45
Three-Week Field Study
• First Session
• Setup Knock x Knock on their devices
• Add 5 existing accounts
• Delete passwords for these from their tools
• Try Knock x Knock for three weeks
• Weekly phone interview
• Second Session
• Post interview
46
Participants
• 13 participants
• 19 to 42 years old (mean: 27)
• All of them except one use browser
password auto-fill feature
• One use KeePass
• One use 1Password
47
Knock x Knock Usage
• 22 – 192 logins (mean:93.3, SD: 58.5)
• Participants with small numbers of logins did
not log out from their online accounts
Authentication to websites
Authentication to Mac
48
Likert-Scale Eval (Security)
1: Very Negative and 5: Very Positive
Storing Credentials in iPhone
1 2 3 4 5
Knocking Mac to Unlock
Three Security Tiers
Location-Awareness
49
Likert-Scale Eval (Usability)
1: Very Negative and 5: Very Positive
Storing Credentials in iPhone
1 2 3 4 5
Knocking Mac to Unlock
Three Security Tiers
Location-Awareness
50
Proximity and Perceived Security
51
Predictable Baseline Availability
52
Transition to Better Authentication
53
Conclusion
54
Online Service
Device
IoT
User
Credential
Management
Client
Unified Authentication Framework
55
Online Service
Device
IoT
User Knock x Knock
User Experience
Unified Authentication Framework
56
Online Service
Device
IoT
User
Credentials
Management
Client
Password as Backend
Location-Aware + Tiered
Perceived Security/Availability
Smooth Transition to Better
User Authentication
Take Away
57
Backup Slides
58
UIMP
• Unified Identity Management Protocol
• RESTful APIs that streamlines
credential management
• Information APIs (e.g., password policy)
• Account APIs
• Authentication APIs
• Notification APIs
59
Example (Account Creation)
URI /account
Method POST
Argument {
“timestamp”: “2013/9/19 13:52:32 GMT”,
“email”: “ehayashi@cs.cmu.edu”,
“password”: “f1sd25ioFA!G”
“name”: “Eiji Hayashi”
}
Return Value Success or Error Message
60
Example (Account Creation)
61
Example (Account Creation)
URI /account
Method POST
Argument {
“timestamp”: “2013/9/19 13:52:32 GMT”,
“email”: “ehayashi@cs.cmu.edu”,
“password”: “f1sd25ioFA!G”
“name”: “Eiji Hayashi”
}
Return Value Success or Error Message
62
Example (Login)
URI /authentication/login
Method POST
Argument {
“timestamp”: “2013/9/19 13:52:32 GMT”,
“email”: “ehayashi@cs.cmu.edu”,
“password”: “f1sd25ioFA!G”
}
Return Value HTML code
63
Example (Policy)
URI /Information/Authentication_Policy
Method GET
Argument -
Return Value Type (only support password in ver. 1.0)
Length
Lower case (true: allowed / false: not allowed)
Upper case (true: allowed / false: not allowed)
Numbers (true: allowed / false: not allowed)
Special characters (true: allowed / false: not allowed)
Minimum number of lower case letters
Minimum number of upper case letters
Minimum number of numbers
Minimum number of special characters
Update period
64
FAQ
65
Question:
What if I lose my phone?
Answer:
Download backup from a server,
decrypt it, restore account information,
and reset all passwords
66
Question:
Can somebody eavesdrop?
Answer:
I assume communications are
protected by HTTPS and appropriate
encryption
67
Question:
How can we pair devices?
Answer:
I also assume that device paring is
done in a secure manner
68
Question:
Can I use UniAuth on public
computers?
Answer:
You can check your password in a
UniAuth client (to be backward
compatible with current practice)
69
Research Contributions
• Design and evaluation
• UniAuth protocol
• Probabilistic authentication framework (CASA)
• Provide a building block for more
natural human-computer interaction
70
One More Lesson
Improve authentication to
a single service
Make the authentications to
multiple services easier
71
One More Lesson
Build a framework that makes
multiple authentication easier
Make the authentications to
multiple services easier
72
Question:
What’s differences between UniAuth
and OAuth, OpenID, or FIDO
73
Question:
What’s differences between UniAuth
and OAuth, OpenID, or FIDO
74
OAuth
75
OAuth
76
Research Contribution
• Understanding account management
practices (Interviews + Diary)
• Context-Aware Scalable
Authentication (Field + Interview)
• Unified Identity Management Protocol
(Expert Review)
• UniAuth Client (Field)
77
Future Works
78
More Security Evaluation
Knock x Knock
• Device Theft
• Insider attacks
• Phishing attacks
UIMP
• Evaluation by security community
79
Deployment
• People really adopt Knock x Knock?
• Service providers adopt UIMP?
80
Replace passwords
• Once enough users and service
provider adopt UniAuth, we can
replace passwords with minimal
impact on user experience
81
Pieces in UniAuth
82
Conventional Way
Online Service Device
83
Conventional Way
Online Service Device
Password Management
Tools
84
Proposed Solution
UniAuth
Client
Online Service Device
85
Proposed Solution
UniAuth
Client
Online Service Device
Unified Identity Management Protocol
86
Proposed Solution
UniAuth
Client
Online Service Device
Context Aware Scalable Authentication
Unified Identity Management Protocol
87
Proposed Solution
UniAuth
Client
Online Service Device
Context Aware Scalable Authentication
Unified Identity Management ProtocolUnified Authentication
Framework
(UniAuth Framework)
88
Half of applications have too
much/too little access control
Users using security lock
After Unlocking Split Always Available
[%]
89
Half of applications have too
much/too little access control
After Unlocking Split Always Available
[%]
 Too hard!
Users using security lock
 OK
90
None of Them Are Happy
After Unlocking Split Always Available
[%]

 

Users using security lock Users NOT using security lock
91
FIDO Bootstrapping
• Service provider should support FIDO
• Third parties should provide FIDO
Servers
• Users should adopt FIDO Clients

More Related Content

What's hot

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Securityrambmohan
 
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...Jakub Kałużny
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password RequirementsJim Fenton
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyNick Malcolm
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...EditorIJAERD
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationArun S M
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxidsecconf
 
Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsPositive Hack Days
 

What's hot (20)

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Class 8, 9 and 10
Class 8, 9 and 10Class 8, 9 and 10
Class 8, 9 and 10
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
Cw4201656660
Cw4201656660Cw4201656660
Cw4201656660
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking Systems
 

Similar to Knock x Knock: The Design and Evaluation of a Unified Authentication Management System

Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaOlajide Kuku
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authenticationMecklerMedia
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2Justin Richer
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Flaws of password-based authentication
Flaws of password-based authenticationFlaws of password-based authentication
Flaws of password-based authenticationsluge
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017Micro Focus
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Shumon Huque
 
474 Password Not Found
474 Password Not Found474 Password Not Found
474 Password Not FoundCodemotion
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windowsarpit06055
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
 

Similar to Knock x Knock: The Design and Evaluation of a Unified Authentication Management System (20)

Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthautha
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authentication
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Flaws of password-based authentication
Flaws of password-based authenticationFlaws of password-based authentication
Flaws of password-based authentication
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
474 Password Not Found
474 Password Not Found474 Password Not Found
474 Password Not Found
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
C02
C02C02
C02
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
 

Recently uploaded

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Recently uploaded (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Knock x Knock: The Design and Evaluation of a Unified Authentication Management System

Editor's Notes

  1. User authentication a basis of current computer systems. We cannot imagine a life without emails, facebook, amazon, or twitter. These services are relying on user authentication. Virtually for all user authentication, we user usernames and passwords
  2. As the number of password increases, they are becoming unmanagable. Or to make it manageable, people adopt insecure practices. Such as using simple passwords, or reusing one password for multiple accounts.
  3. And there are people who claim passwords are broken.
  4. To address this problem, so many works have proposed ways to improve passwords and password alternatives. However, their adoptions are very limite
  5. In 2012 Bonneau did an exhaustive analysis of password alternatives, and concluded that.
  6. In these works, people focused on authentication scheme, how to login to websites. However there are so many task related to user authentication.
  7. These are account management. If this account management is easy, people would use long, secure, and unique passwords for their accounts So, essentially, we built a management layer without modifying existing password-based authentication. Then this system will be highly backward-compatible and addressed the deployability challenge. These address the existing challenges in password-based authentication.
  8. Finally, this system can address forthcoming problem too. We are envisioning Internet of Things, where so many physical objects are connected to network. In this setting, we need some sort of user identification or authentication to these objects. However, these objects do not have appropriate input capability for password-based authentication. We also addressed this challenge by providing an API set that allows authentication to physical devices in addition to automated account management.
  9. So our system uses password as backend, addresses management problem rather than trying to replace passwords, and provide API set for further improvements.
  10. Here is the basic idea.
  11. We let a client running on a smart device manage all credentials
  12. A user only needs to authenticate to the client. So, he has to mange one client instead of many passwords. For this authentication we can utilize sensors on the smart device to make it secure and usable.
  13. Then, this client authenticates to online services, devices, and IoT using M2M protocol. So it scales. Because the user does not have to memorize passwords, the client can use secure passwords.
  14. Finally, if we store many account information in one client, user authentication to this client should be usable and secure. So, I also propose to use Context-Aware Scalable Authentication as an authentication scheme for this. This scheme authenticate users based on information collected by passive sensors, such as GPS or accelerometers to adjust security level of the authentication system. And I call this entire framework as Unified Authentication Framework, UniAuth in short.
  15. Then, this client authenticates to online services, devices, and IoT using M2M protocol. So it scales. Because the user does not have to memorize passwords, the client can use secure passwords.
  16. Knock x Knock essentially work as a password manager. It stores all credential of iPhone, and send the credential to Mac seamlessly over BLE. One of the interesting feature in Knock x Knock is knock to unlock featue.
  17. In Knock x Knock, sers can physically knock their Mac to log into it. Our application running on the Mac detects the knocking using a microphone and SVM classifier. When it detect knocking, it request a login password to iPhone. If a user’s iPhone is nearby, it sends password back, and the application on the Mac generates fake key events to auto-fill the password and log into the mac. Knocking is very good as an indicator of login. It’s easy to detect using microphone or accelerometer. Also, it has a nice semantic meaning since we tends to knock something when start using it. This can be expanded to authentication to other physical devices and/or IoT.
  18. One of the novel features is location-aware tiered access control. Uses can assign each credential to one of the three tiers: secure, standard, and quick. Then, the system locks and unlocks these tiers separately using location information and a master password. To login to an account stored in a tier, the tier should be unlocked state.
  19. This table shows how we balance security and usability differently in each tier.
  20. This table shows how we balance security and usability differently in each tier.
  21. This table shows how we balance security and usability differently in each tier.
  22. This table shows how we balance security and usability differently in each tier.
  23. This table shows how we balance security and usability differently in each tier.
  24. Knock x Knock can also provide additional features if server-side supports UIMP. However no service supports UIMP now. So we evaluated these features using paper prototypes. Because time constrain, I cannot talk about details. But essentially participants were really positive about these features.
  25. This graph shows the frequency of user authentication via Knock x Knock. Each bar represents a participant. Y-axis represents total number of authentication during three weeks. The white parts denote authentication to online services. The gray parts denote authentication to Mac.
  26. Here is a result of Likert-scale evaluation by participants. Here 1 denotes very negative and 5 denotes very positive. In this box plot, red lines denotes medians, box represents 25 percentile to 75 parcentile, whiskers represent range except out layers, and red plus represent out-layers. In general, our participants were positive about security of Knock x Knock in terms of these four aspects.
  27. Here is the same analysis on usability of the system . Again, our participants were very positive. Now, just saying, our participants liked our system, is not that interesting. It’s more insightful why they liked it.
  28. The first qualitative finding is that proximity affected perceived security significantly. Many people said that because passwords are stored in iPhones which were close to them they felt it was secure compared to storing them in computers or cloud, which are not as close as iPhone. I do agree that perceived security is different from real security. But it’s also true that people make decision of whether they use a system or not based on their perceived security. Thus it’s important to design a system with high perceived security to facilitate adoption.
  29. Another reason is related to the availability. When users try a new system, they don’t know how reliable the system is. This negatively affect adoption of the system. In knock x Knock, users can see their passwords by typing their master passwords on their iPhone. So, as long as they have iPhones, thier batteries are charged, and they remember their passwords, they can log into their account by typing the password manually. Our participants had enough experience to estimate baseline availability is predictable. Many participants commented on this when describing why they liked Knock x Knock.
  30. Finally, Knock x Knock provide a smooth transition to better authentication. This is what we think very good rather than our participants mentioned in the interview. Our results demonstrated that our participants liked Knock x Knock. So, when we release the app, we can expect reasonable adoption. This is the first step. Then, after reasonable adoption of Knock x Knock, now, service providers have incentive to adopt UIMP, because people are already using UIMP compatible applications. This is the second step. Finally, after service provider adopt UIMP, we can replace password-based authenticaiton with more secure one such as asymetirc crypto without affecting user experience. Because, at this point, users are not touching passwords at all, changing it does not affect user experience. At this step, we can finally get rid of passwords.
  31. Then, this client authenticates to online services, devices, and IoT using M2M protocol. So it scales. Because the user does not have to memorize passwords, the client can use secure passwords.
  32. Finally, if we store many account information in one client, user authentication to this client should be usable and secure. So, I also propose to use Context-Aware Scalable Authentication as an authentication scheme for this. This scheme authenticate users based on information collected by passive sensors, such as GPS or accelerometers to adjust security level of the authentication system. And I call this entire framework as Unified Authentication Framework, UniAuth in short.
  33. Before describing the details of the proposed solution, let me
  34. UIMP is the name of the M2M protocol. It is designed as RESTful APIs that streamlines not only authentication but also credential management. The protocol consists of four sets of APIs. Because of time constrain I will give just a few examples here. For full specification, please refer my dissertation document.
  35. Here is account creation API. This is very close to what we are doing using a HTML form.
  36. This example is for twitter. But if a user want to create an account at amazon, amazon would need more information about the user and the API will send more information about the user.
  37. Here is a login API. Again this is a direct translation of a HTML form. I chose direct translation to minimize server side modification. Server side already has a code to handle inputs from HTML forms. So if the API pass the same data, sever side can reuse the same code to handle it.
  38. In addition to replacing existing interaction, UIMP also provides natural transition to make current user authentication better. Here is an example. This API essentially make password composition policy machine readable. Making it machine readable already have some benefit. Existing password managers have password generation features, but generating password that comply with various policies is challenging. This API make it simple.
  39. details ----- Meeting Notes (7/16/13 13:05) ----- framework ->protocol
  40. Now, let me talk about an overview of UniAuth framework
  41. In a conventional way, users are managing all account information such as user IDs and passwords
  42. They may use variety of tools that support password management, such as sticky notes, auto fill features in web browsers, or password management applications. However, still, users have to deal with accounts by themselves in many situations, such as password update, account creation, updating account information. Because of this, when the number of services and devices increases, the users’ workload increases too.
  43. I propose putting one client between the services and users, and let the client manage all account information.
  44. Furthermore, to allow the client communicate with services and devices smoothly, I define a protocol, which is a set of APIs. Using the protocol, the client can not only manage authentication, but also other tasks related to account management, such as creating account, updating passwords, monitoring the account activities.
  45. Finally, if we store many account information in one client, user authentication to this client should be usable and secure. So, I also propose to use Context-Aware Scalable Authentication as an authentication scheme for this. This scheme authenticate users based on information collected by passive sensors, such as GPS or accelerometers to adjust security level of the authentication system. And I call this entire framework as Unified Authentication Framework, UniAuth in short.
  46. Finally, if we store many account information in one client, user authentication to this client should be usable and secure. So, I also propose to use Context-Aware Scalable Authentication as an authentication scheme for this. This scheme authenticate users based on information collected by passive sensors, such as GPS or accelerometers to adjust security level of the authentication system. And I call this entire framework as Unified Authentication Framework, UniAuth in short.
  47. Now let’s look at how each participants categorized applications. This graph shows the categorization on phones by participants using security locks. The red parts denote the application in the available only after unlocking, the green parts shows the split category, and the blue parts denote the applications in always available.
  48. Because those participants used security locks on their phones. They were happy about the red parts. The applications were protected when the devices were locked. But, they were not happy about the blue parts. They wanted these application to be available even when the devices were locked. However, they had to unlock the devices to use these applications.
  49. Too soft!