Please use this identifier to cite or link to this item:
https://doi.org/10.1109/SP.2012.10
DC Field | Value | |
---|---|---|
dc.title | A framework to eliminate backdoors from response-computable authentication | |
dc.contributor.author | Dai, S. | |
dc.contributor.author | Wei, T. | |
dc.contributor.author | Zhang, C. | |
dc.contributor.author | Wang, T. | |
dc.contributor.author | Ding, Y. | |
dc.contributor.author | Liang, Z. | |
dc.contributor.author | Zou, W. | |
dc.date.accessioned | 2014-07-04T03:10:46Z | |
dc.date.available | 2014-07-04T03:10:46Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Dai, S., Wei, T., Zhang, C., Wang, T., Ding, Y., Liang, Z., Zou, W. (2012). A framework to eliminate backdoors from response-computable authentication. Proceedings - IEEE Symposium on Security and Privacy : 3-17. ScholarBank@NUS Repository. https://doi.org/10.1109/SP.2012.10 | |
dc.identifier.isbn | 9780769546810 | |
dc.identifier.issn | 10816011 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/77954 | |
dc.description.abstract | Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have long been threatened by malicious developers who can plant backdoors to bypass normal authentication, which is often seen in insider-related incidents. A malicious developer can plant backdoors by hiding logic in source code, by planting delicate vulnerabilities, or even by using weak cryptographic algorithms. Because of the common usage of cryptographic techniques and code protection in authentication modules, it is very difficult to detect and eliminate backdoors from login systems. In this paper, we propose a framework for RCA systems to ensure that the authentication process is not affected by backdoors. Our approach decomposes the authentication module into components. Components with simple logic are verified by code analysis for correctness, components with cryptographic/ obfuscated logic are sand boxed and verified through testing. The key component of our approach is NaPu, a native sandbox to ensure pure functions, which protects the complex and backdoor-prone part of a login module. We also use a testing-based process to either detect backdoors in the sand boxed component or verify that the component has no backdoors that can be used practically. We demonstrated the effectiveness of our approach in real-world applications by porting and verifying several popular login modules into this framework. © 2012 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SP.2012.10 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/SP.2012.10 | |
dc.description.sourcetitle | Proceedings - IEEE Symposium on Security and Privacy | |
dc.description.page | 3-17 | |
dc.identifier.isiut | 000309219900001 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.