The WHO Hardware Token Security Model ( Position Paper )
نویسندگان
چکیده
Existing Internet applications usually rely on a secure communication channel (such as SSL) or users’ passwords to provide a secure communication. And usually we assume that the browser and the computer we are using are trustworthy. However, these assumptions are obviously unrealistic. In this paper, we try to address these issues, in particular, we describe a trust model, call the WHO model, which does not rely on a trusted computer to communicate with the server. The key ideas of the model rely on a carefully designed hardware material accessing module as well as an open-source in-house developed trusted browser. Prototype systems are currently implemented. Preliminary results show that the systems are secure, convenient to use, and are flexible for incorporating different secure protocols.
منابع مشابه
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT ’07) and relaxes the trust assumption. Our improved model is motivated by the real-world practice of outsourcing hardware production to possibly untrusted manufacturers and allows tokens created by honest parties to be corrupted at the time of their ...
متن کاملFrom Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Universally composable multi-party computation is impossible without setup assumptions. Motivated by the ubiquitous use of secure hardware in many real world security applications, Katz (EUROCRYPT 2007) proposed a model of tamper-proof hardware as a UC-setup assumption. An important aspect of this model is whether the hardware token is allowed to hold a state or not. Real world examples of tamp...
متن کاملhPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers
In this paper, we propose hPIN/hTAN, a low-cost hardware token based PIN/TAN system for protecting e-banking systems against the strong threat model where the adversary has full control over the user’s computer. This threat model covers various kinds of attacks related to untrusted terminal computers, such as keyloggers, screen scrapers, session hijackers, Trojan horses and transaction generato...
متن کاملAttacks on and Countermeasures for USB Hardware Token Devices
This paper presents the methods used to attempt access to private data stored in Universal Serial Bus (USB) hardware tokens without having legitimate credentials. We look at the current state-of-theart products of the commercial world. Our research is based on an approach of using only common, off-the-shelf tools, yet we still succeed in defeating the security features and gaining access to pri...
متن کاملSecure Set Intersection with Untrusted Hardware Tokens
Secure set intersection protocols are the core building block for a manifold of privacy-preserving applications. In a recent work, Hazay and Lindell (ACM CCS 2008) introduced the idea of using trusted hardware tokens for the set intersection problem, devising protocols which improve over previous (in the standard model of two-party computation) protocols in terms of efficiency and secure compos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006