91青青草

News

Is zero-effort computer security a dream?

Study shows that although ZEBRA works very well with honest people, opportunistic attackers can fool the system.
Simple yet secure ways to login and logout are particularly crucial in multi-user organizations, such as hospitals.

Researchers from Aalto University and the University of Alabama at Birmingham have found vulnerabilities in a recently proposed user verification security system for computers.

This new security system, developed by Dartmouth College researchers, was created in response to a need for easy-to-use systems that determine whether someone is, in fact, who he or she is declaring to be鈥攁 process known as authentication.

鈥淚n our technologically based society, we need a password to do just about everything鈥攆rom banking to communicating,鈥 said Nitesh Saxena, Ph.D., the director of the Security and Privacy In Emerging computing and networking Systems (SPIES) lab and associate professor of computer and information sciences in UAB鈥檚 College of Arts and Sciences.

鈥淏ecause people often have trouble remembering all of their various passwords for different platforms, there is a lot of value in identifying simple, yet secure, ways to login and logout of whatever it is we are doing.鈥

It is particularly crucial in multi-user organizations, such as hospitals involving confidential patient information, to prevent one person from using someone else's login session, even accidentally.

鈥淭he security community has made progress toward achieving the right authentication system,鈥 Saxena said. 鈥淏ut designing one that is both user-friendly and secure is not an easy task.鈥

Researchers from Dartmouth College sought to address this issue and create secure, user-friendly authentication, through the development of ZEBRA, or Zero-Effort Bilateral Recurring Authentication. Zero-effort authentication systems such as ZEBRA take the user out of the equation so that little to no user effort is required to ensure secure sessions.

The new system was designed to address potential security problems with deauthentication, when ideally, the user鈥檚 device logs out or locks itself promptly after exiting a session. ZEBRA offers a zero-effort method of deauthentication through continuously authenticating a logged in user by comparing what the user is doing on a device, such as a computer terminal, with measurements from a wrist-worn bracelet.

The device then uses a machine learning classifier to map those actions into a sequence of predicted interactions.

In the ZEBRA system, every user is required to wear a Bluetooth-enabled bracelet, similar to a Fitbit, and the system knows who is wearing which bracelet. When the user logs into a device the first time, the system establishes a secure connection to the bracelet. While the user interacts with the device, the bracelet will send the measurements generated by the interactions over to the device. The device then uses a machine learning classifier to map those actions into a sequence of predicted interactions.

鈥淣ow the device has two different, bilateral views of the same phenomenon: the first is the sequence of direct interactions and the second is the sequence of predicted interactions inferred from the measurements,鈥 said N. Asokan, a professor from Aalto University Department of Computer Science. 鈥淚f the two sequences match, ZEBRA can conclude that the person who is interacting with it is the same person who is wearing the right bracelet for the current login session. On the contrary, if the sequences diverge, ZEBRA can promptly and automatically deauthenticate the current login session.鈥

Study of UAB and Aalto University, which was funded by the National Science Foundation and the Academy of Finland, shows that although ZEBRA, a system intended to enable prompt and user-friendly deauthentication, works very well with honest people, opportunistic attackers can fool the system, explains Asokan.

In the study, 20 test participants played the role of victims while the researchers acted as attackers. The attackers mimicked what the victims were doing on their devices.

鈥淲e wanted to evaluate whether or not ZEBRA could be defeated, to measure how secure it would be when faced with someone actively attempting to hijack a user鈥檚 login session,鈥 Saxena said. 鈥淲e found that an opportunistic attacker can take advantage of the user quite easily.鈥

The opportunistic attacker can choose to be near the victim and see or hear what the victim is doing and decides what interactions to mimic.

The opportunistic attacker can choose to be near the victim and see or hear what the victim is doing and decides what interactions to mimic. For instance, a keyboard-only attacker can stop typing before the victim does and ignore everything but the user鈥檚 keyboard interactions.

鈥淲hen the attacker accessed a computer with an open session and carefully chose what he did on the computer, ZEBRA was not able to log him out,鈥 Asokan said. 鈥淚n fact, opportunistic attackers evaded detection 40% of the time, mimicking the victim only when he or she thought that it will be successful.鈥

Although susceptible to opportunistic adversaries, ZEBRA still performs well against accidental misuse by innocent adversaries.

鈥淢odeling what an attacker can do is difficult. We point how inadequate modeling of the attacker can lead to incorrect conclusions about the security of a system,鈥 Asokan said. 鈥淲ith a realistic attacker model in place, shortcomings in a system will become more apparent and can be addressed.鈥

This joint work between Aalto University and UAB is being presented this week at the 2016 Network and Distributed System Security Symposium in San Diego. Graduate students Otto Huhta, Mika Juuti, and Swapnil Udar of Aalto University and Prakash Shrestha from UAB co-authored the paper with Asokan and Saxena.

Further information:

Professor N. Asokan
Aalto University Department of Computer Science

Tel. +358 50 483 6465
n.asokan@aalto.fi

The article online: (arxiv.org)

Background information about the study in the

  • Updated:
  • Published:
Share
URL copied!

Read more news

A person walks past a colourful mural on a brick wall, illuminated by street lamps and electric lines overhead.
Cooperation, Research & Art, University Published:

New Academy Research Fellows and Academy Projects

A total of 44 Aalto researchers received Academy Research Fellowship and Academy Project funding from the Research Council of Finland 鈥 congratulations to all!
Two light wooden stools, one with a rectangular and one with a rounded structure, placed against a neutral background.
Research & Art Published:

Aalto University's Wood Studio's future visions of Finland's most valuable wood are presented at the Finnish Forest Museum Lusto

Curly birch 鈥 the tree pressed by the devil 鈥 exhibition will be on display in Lusto until March 15, 2026.
Five people with a diploma and flowers.
Awards and Recognition, Campus, Research & Art Published:

Spring term open science highlight: Aalto Open Science Award Ceremony

We gathered at A Grid to celebrate the awardees of the Aalto Open Science Award 2024 and discuss open science topics with the Aalto community.
Two interconnected circular loops; one blue labelled 'Simulation DBTL loop', one brown labelled 'Real-world DBTL loop'.
Awards and Recognition, Press releases, Research & Art Published:

A revolution for R&D with the missing link of machine learning 鈥 project envisions human-AI expert teams to solve grand challenges

Samuel Kaski receives ERC Advanced Grant to develop new machine learning that is robust, generalisable and engages human experts.