论文标题

在观察弹性认知身份验证方案中利用行为侧通道

Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes

论文作者

Zhao, Benjamin Zi Hao, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Trevisan, Francesca, Yuan, Haiyue

论文摘要

观察弹性身份验证方案(ORAS)是一类共享的秘密挑战 - 响应识别方案,其中用户通过认知功能在心理上计算响应以对自己进行身份验证,以使窃听者无法轻易提取秘密。 ORAS的安全评估通常涉及量化通过观察到的挑战响应对泄漏的信息。但是,很少的工作评估了与这些方案互动时通过人类行为泄漏的信息。实现观察弹性的一种常见方法是将模量操作包括在认知功能中。这将由于从可能的秘密集到给定响应的一组地图而导致有关秘密泄漏的信息最小化。在这项工作中,我们表明可以将用户行为用作侧通道,以获取此类秘密。具体而言,用户的眼睛移动模式和相关的定时信息可以推断是否执行了模量操作(一种基本设计元素),以泄漏有关该秘密的信息。我们进一步表明,如果扣除是错误的,在实践中更有可能的情况下,仍然可以检索秘密。我们通过分析对待漏洞,并提出了一种通用攻击算法,尽管“错误”模量信息,但迭代地获得了秘密。我们证明了对五个ORA的攻击,并表明秘密可以比非侧通道攻击(例如代数/统计攻击)挑战响应对少得多。特别是,我们的攻击适用于Mod10(一种基于一次性pad的方案),不存在非侧通道攻击。我们通过一项小规模的眼睛跟踪用户研究进行现场测试攻击。

Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge-response identification schemes where a user mentally computes the response via a cognitive function to authenticate herself such that eavesdroppers cannot readily extract the secret. Security evaluation of ORAS generally involves quantifying information leaked via observed challenge-response pairs. However, little work has evaluated information leaked via human behavior while interacting with these schemes. A common way to achieve observation resilience is by including a modulus operation in the cognitive function. This minimizes the information leaked about the secret due to the many-to-one map from the set of possible secrets to a given response. In this work, we show that user behavior can be used as a side-channel to obtain the secret in such ORAS. Specifically, the user's eye-movement patterns and associated timing information can deduce whether a modulus operation was performed (a fundamental design element), to leak information about the secret. We further show that the secret can still be retrieved if the deduction is erroneous, a more likely case in practice. We treat the vulnerability analytically, and propose a generic attack algorithm that iteratively obtains the secret despite the "faulty" modulus information. We demonstrate the attack on five ORAS, and show that the secret can be retrieved with considerably less challenge-response pairs than non-side-channel attacks (e.g., algebraic/statistical attacks). In particular, our attack is applicable on Mod10, a one-time-pad based scheme, for which no non-side-channel attack exists. We field test our attack with a small-scale eye-tracking user study.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源