Emerging Technologies for Authorization and Authentication Third International Workshop ETAA 2020 Guildford UK September 18 2020 Proceedings Andrea Saracino - Download the ebook now for the best reading experience
Emerging Technologies for Authorization and Authentication Third International Workshop ETAA 2020 Guildford UK September 18 2020 Proceedings Andrea Saracino - Download the ebook now for the best reading experience
com
OR CLICK HERE
DOWLOAD EBOOK
Emerging Technologies
LNCS 12515
for Authorization
and Authentication
Third International Workshop, ETAA 2020
Guildford, UK, September 18, 2020
Proceedings
Lecture Notes in Computer Science 12515
Founding Editors
Gerhard Goos
Karlsruhe Institute of Technology, Karlsruhe, Germany
Juris Hartmanis
Cornell University, Ithaca, NY, USA
Emerging Technologies
for Authorization
and Authentication
Third International Workshop, ETAA 2020
Guildford, UK, September 18, 2020
Proceedings
123
Editors
Andrea Saracino Paolo Mori
Istituto di Informatica e Telematica Institute of Informatics and Telematics
Consiglio Nazionale delle Ricerche Pisa, Italy
Pisa, Italy
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
This book contains the papers which were selected for presentation at the Third
International Workshop on Emerging Technologies for Authorization and Authenti-
cation (ETAA 2020), that was held in Guildford, UK, on September 18, 2020,
co-located with the 24th European Symposium on Research in Computer Security
(ESORICS 2020).
The workshop program included 10 full papers concerning the workshop topics, in
particular: new techniques for biometric and behavioral based authentication, authen-
tication and authorization in the IoT and in distributed systems in general, techniques
for strengthening password based authentication and for dissuading malicious users
from stolen password reuse, an approach for discovering authentication vulnerabilities
in interconnected accounts, and strategies to optimize the access control decision
process in the big data scenario.
We would like to express our thanks to the authors who submitted their papers to the
third edition of this workshop, thus contributing to making it once again a successful
event, even through the difficulties brought by a fully virtual event.
Last but not least, we would like to express our gratitude to the members of the
Technical Program Committee for their valuable work in evaluating the submitted
papers.
Workshop Chairs
Paolo Mori Consiglio Nazionale delle Ricerche, Italy
Andrea Saracino Consiglio Nazionale delle Ricerche, Italy
1 Introduction
User authentication in online systems is fertile ground for many new solutions. Each
system has its pros and cons, but most solutions are focused on the login phase, during
which users must enter a password, a token (e.g., a one-time password), or even a
biometric attribute such as their fingerprint or facial image. Although solutions that
focus only on the login phase are effective, they don’t protect users against session
hijacking after the login phase or if their credentials have been leaked. One emerging
type of approach that isn’t focused on the login phase uses continuous authentication to
complement existing login solutions. The idea behind this approach is that continuous
authentication constantly verifies the user’s identity throughout an active session.
One of the ways to implement continuous authentication is behavioral biometrics,
which verifies the identity of a user based on his or her particular behavioral traits while
showed that this approach exhibited an advantage when low false positive rate (FPR) is
required.
2 Related Work
Behavioral biometrics as a continuous authentication mechanism has been researched
for several decades and includes several different approaches. One of the most com-mon
techniques is keystroke dynamics, which focuses on verification based on the particular
way each user types on the keyboard [5–9]. There are generally two types of keystroke
dynamics, based on the characteristics of the text to which they are applied: fixed-text
keystroke dynamics, which require users to enter a repeat-able text that can be very
short (such as a password); and free-text keystroke dynamics, which requires users to
enter more text, but text that can be spontaneous (e.g., email) and changed. Fixed-text
keystroke dynamics are usually applied in the login page, and in general cannot serve
as a continuous authentication mechanism. Free-text keystroke dynamics can be used
for this, but only in systems that require the user to continuously type long text, which
is not too common in regular internet use (e.g., browsing news, video streaming, and
social media). In these types of applications however, most interactions are done through
mouse dynamics (on desktops) or touch dynamics (on mobile devices). Therefore, we
focus on solutions from the pointing device domain.
For example, Ahmed et al. [10, 11] used mouse movement for user verification.
After collecting the movement coordinates and events, they categorized each movement
according to four types: mouse-move, point-and-click, drag-and-drop, and silence. Next,
they extracted descriptive features such as travel distance, elapsed time, average speed,
and more. The feature vectors were aggregated into histograms and used for training
and testing neural networks. Pusara et al. [13] worked on the same task, collecting
mouse coordinates and click events. They segmented the data by the number of defined
movement points and extracted features such as distance, speed, angle, etc., using a C5.0
decision tree to classify the segmented data and produce a score. Feher et al. [12] also
used mouse movement for user verification but with additional descriptive features such
as curvature, moment, etc. They segmented the movements into actions and proposed a
verification method that is applied on each individual segment, using a Random Forest
classifier applied on the segments to produce a score for the user identity. Zheng et al. [15]
also presented a verification scheme based on the user’s mouse movement coordinates
and time. They extracted angle-based features and applied the widely used Support
Vector Machine (SVM) algorithm.
Shen et al. [14] designed an efficient user verification method using one-class clas-
sification and dimensionality reduction. They divided their features into two types: pro-
cedural (e.g., speed curve against time, acceleration curve against time) and holistic
(e.g., double click statistics, movement elapsed time). They applied several different
one-class classification algorithms with Principal Components Analysis (PCA) dimen-
sionality reduction, where the best among them was one-class SVM. In another paper,
Shen et al. [16] divided the data into what they referred to as frequent behavior segments.
These segments are stacked into a sequence of an ordered set of operations, and then
integrated into mouse pattern sequence generation, matching methods, and finally into
the selected one-class classification algorithm.
4 M. Levi and I. Hazan
Antal et al. [27] used mouse movement to detect intrusion in systems. The mouse
movements were tracked and segmented according to three possible user actions: mouse-
move, point-and-click, and drag-and-drop. Features taken from various papers were then
extracted, such as distance, acceleration, jerk, straightness, critical points, and more.
Finally, they applied several supervised classification algorithms, among them Random
Forest, which performed best. The authors showed that detection improved as the number
of actions grew, and that the clearest action for detecting impostors is drag-and-drop.
Hinbarji et al. [28] used mouse movement to verify user identity, but unlike other
methods, they focused on the properties of the generated curves and their discriminative
information. The curves are created from consecutive coordinates, and several curves
are grouped into a session. For each curve, they extracted features such as efficiency,
self-intersection, regularity, and more. The probability distribution of the features was
inserted into a neural network built independently for each user. Tan et al. [29] used
time-series forecasting for user verification in mouse movement, applying curve-fitting
strategies to the data. Here again the authors took the coordinates of the movement and
applied a curve-fitting method to the raw data, such as cubic splines, AR, and ARMA.
They then extracted features and integrated them with the linear SVM algorithm, showing
results comparative to the traditional methods.
Another researched area of continuous authentication using behavioral biometrics is
through mobile devices. Patel et al. [21] produced a thorough overview of existing meth-
ods and suggested paths for further research in the field. The reviewed works [18–20] that
focused on touch dynamics for continuous mobile authentication were also based on the
user touch coordinates X, Y and additional metrics extracted from the touchscreen. The
authors developed methods that included innovative feature engineering and machine
learning algorithms.
Other researchers sought to add additional information to touch dynamics. Feng
et al. [22] used touch dynamics to verify user identity, adding the context of the running
application. Ben Kimon et al. [17] addressed the same task by monitoring touch gesture
sequences and the context of both the user (e.g., driving, walking) and the device (e.g.,
power consumption, running app). Each user model was trained on gesture trac-es within
a predefined time interval using the gradient boosting learning algorithm. Jain et al. [31]
combined touch dynamics with motion and orientation sensors to improve verification.
The authors used the X, Y coordinates and finger area, in addition to the accelerometer
and orientation. They extracted descriptive features and used min-max normalization,
and eventually used the modified Hausdorff distance to pro-duce a score.
Other researchers tried to limit the level of information or work in different setups.
Yang et al. [30] proposed a continuous authentication method in mobile based on one-
class classification algorithms, evaluating one-class SVM and Isolation Forest. They
extracted movement-based features, such as velocity and slope, and pressure-based fea-
tures, such as pressure at start and pressure at end; the process involved removing outliers
before the feature extraction and running a min-max normalization after-ward. Ngyuen
et al. [32] used touchscreen dynamics to detect user identity across multiple devices.
They evaluated verification abilities through three different tasks: reading, writing, and
playing a game. They extracted features that relate to the coordinates, time, and finger
size, and used multi-class SVM to classify the users. They found that the best task for
detection across devices is reading, followed by playing, and lastly writing.
Deep Learning Based Sequential Mining for User Authentication in Web Applications 5
As opposed to many previous works, we don’t use the feature engineering scheme to
profile users based on their movement coordinates. We use sequence-mining techniques
to learn users’ element paths through websites. Our method can be used in parallel to
existing methods to complement them. To the best of our knowledge, the only work
that seeks to verify a user’s identity based on their elemental paths within the context
of a website is our previous work [23]. In that work, we demonstrated the encouraging
results received when using sequence mining over web elements with HMM and Linear
Regression. In this work, we present extensive research and further experiments using
different deep learning mechanisms (LSTM, LSTM with Attention and 1D CNN) to
build a global model (per web application) that can distinguish be-tween benign users
and impostors.
3 Suggested Method
In our previous work [23], we introduced a new technique to profile users and identify
imposters in web applications. This technique analyzes the user’s behavior based on
sequences constructed from elements they interacted with during their session on the
website. Each element is defined by element name, element type, ancestor element, and
interaction type.
The user’s pointing device movements during a session form a path that consists
of the specific website’s elements with which the user interacts. This path indicates the
order in which elements were traversed by the user and the action that was taken on
each element. The basic assumption we rely on is that people tend to develop habits for
routine tasks. Therefore, we assume that each user develops “preferred” paths during
his or her sessions on the website. Sharp deviations from those paths could indicate a
possible attack.
A path consists of the elements the pointing device traversed during the session.
Hence, each session on the website constructs a single sequence or path.
In the following section we introduce a cost-efficient and fast global model approach
that uses sequences from different users and previously seen impostors, with the goal of
distinguishing between the two.
We collect pointing device data using a Java Script snippet integrated into the different
pages of the website. Each pointing device event (press, move, scroll, swipe, etc.) the
user performs is collected and sent to the servers. For each event, we extract the following
information:
Such that:
• Ancestor: In a case where the element does not contain a name, our collectors tra-
verse the HTML Document Object Model (DOM) and attach the element name to its
ancestor’s name
Each such quartet is treated as an event in the time series of events that represent
the user’s movements over the website’s elements. The learning and predictions are
performed using different neural networks models: one-dimensional CNN, LSTM, and
LSTM with Attention model.
There are various ways in which we can construct sequences, as shown in Fig. 1. We
tested the following construction options:
• Construct sequences based on all elements the user interacted with (swiped/
• clicked/hovered) during the session
• Construct sequences based on elements that were pressed/clicked
• Construct sequences based on elements that were stopped on (stopping is defined
using a predefined period of time in which the user did not move the device)
Each type of sequence construction has its own advantages and disadvantages. The
full sequence construction type contains more information and gives us a more precise
point of view on the path the user took. However, since the sequence has more data, it also
contains more noise, and therefore requires more data for training. On the other hand,
the other two types of sequence construction contain less data about the path but are
easier to generalize and model. At the end of the process, we built movement sequences
based on the website structure for all of the user’s historical sessions.
Pointing device movements can be viewed as a sequence of events, where each event
consists of the HTML element in which the pointing device was at time t. Since our
data has sequential characteristics; we need a learning algorithm that can use these
Deep Learning Based Sequential Mining for User Authentication in Web Applications 7
4 Experiments
In our experiments we trained LSTM, LSTM with Attention and 1D CNN. All algorithms
attempt to detect impostors’ activity using the sequential data.
4.1 Dataset
We received mouse data from IBM that consists of data from more than 2000 real
anonymous users. The data contained benign data and impostor data. The original dataset
we presented in our previous work [23] also contained touch device data; however, due
to an insufficient amount of touch device data for a global model, we tested our method
only on the mouse data. Nevertheless, the method is suitable for both and we leave the
application of touch for future work. The dataset contains both benign and impostor
data.
8 M. Levi and I. Hazan
Benign data – the dataset contained sessions from users’ web accounts during their
daily account actions on the website. The users were monitored over a period of several
months in an uncontrolled environment and for each of the 2000 real anonymous users
we collected up to 40 sessions.
Impostor data – the dataset contained 75 real impostor sessions that gained control
over innocent user accounts.
All sessions were monitored in an uncontrolled environment while users performed
their daily account actions. The data was collected using a JavaScript code integrated
into the different pages of the website and each session contained the elements related
data (element type, element name, interaction type and ancestor) with respect to the
user’s pointing device movements during the session.
LSTM with Attention Architecture. Our LSTM with Attention architecture uses the
LSTM architecture mentioned above and integrates the attention mechanism on top
of the LSTM architecture. Hyper-parameter tuning was performed using randomized
search. The chosen set of parameters is described below.
Best results for the LSTM with Attention network were obtained using the following:
learning rate 0.002, batch size: 32, weight decay: 0, hidden size: 64, embedding length:
100, dropout: 0.2, bidirectional: False, number of layers: 1 (Fig. 2).
4.3 Results
We tested different techniques to detect impostor activity for mouse devices by training
different global models designed to distinguish between impostor activity and benign
activity. The results are summarized in confusion matrices presented in Tables 1, 2, and
3, and their associated ROC graphs presented in Figs. 4, 5, and 6.
LSTM Results. Using the mouse data, our LSTM model achieves approximately 0.86
AUC with 97% true negative rate (TNR) and 57% true positive rate (TPR). We can
observe that the LSTM model is more benign-oriented and can be effective when high
TNR is needed, at the expense of the TPR. To improve our LSTM results, we also
tried to use deep LSTM (stacking several LSTM layers). Stacking two to three LSTM
layers improved results on benign users by 1–2%. Another approach we tried was using
bidirectional LSTM; however, we did not see any significant improvement in the results.
LSTM with Attention Results. Using the mouse data, our LSTM with Attention model
achieves 0.88 AUC with 98% true negative rate (TNR) and 63% true positive rate (TPR).
We can observe that this model is also more benign oriented and can be effective when
high TNR is needed, at the expense of the TPR. Stacking several layers of LSTM with
Attention did not improve the results.
CNN Results. Using the mouse data, the one-dimensional CNN model achieves ap-
proximately 0.84 AUC with 98% true negative (TNR) and 56% true positive (TPR). We
can observe that this model is also more benign-oriented and can be effective when high
TNR is needed at the expense of the TPR.
10 M. Levi and I. Hazan
Table 1. LSTM predicted results vs. actual labels on real web application users’ data and
impostors’ data.
The top performing algorithm in our experiments was the LSTM with Attention.
Since keeping the FPR as low as possible is essential when focusing on commercial uses
for continuous authentication, we compare our global model results with our previous
user-based work [23], which used HMM with Linear Regression, while focusing on low
FPR.
When focusing low FPR of up to 2%, the LSTM with Attention gains an advantage
of up to 6% more TPR over the HMM with Linear Regression.
Deep Learning Based Sequential Mining for User Authentication in Web Applications 11
Table 2. LSTM with Attention predicted results vs. actual labels on real web application users’
data and impostors’ data.
Table 3. 1D CNN predicted results vs. actual labels on real web application users’ data and
impostors’ data.
Fig. 5. LSTM with Attention ROC of impostor data vs. benign user data.
5 Conclusion
We presented a deep learning approach to verify user authenticity using the traversed
paths of web elements, as we proposed in our previous work [23]. Instead of learning
common features based on the users’ pointing device movement (e.g., speed, angle), our
method uses sequences of hovered or pressed web elements. Our previous work [23]
Deep Learning Based Sequential Mining for User Authentication in Web Applications 13
introduced a model-per-user approach using HMM and Linear Regression. In our current
work, we present various deep learning mechanisms that use a single global model.
We tested our current solutions using mouse data from IBM, containing data from
daily internet tasks for more than 2000 real anonymous users, and showed that our
different mechanisms were capable of successfully distinguish between impostors and
benign users.
Among the deep learning methods that we tested; LSTM with Attention performed
best with AUC of 0.884.
Although the overall AUC score of the HMM from our previous work was slightly
higher (AUC of 0.908), the LSTM with Attention showed better results when focusing
on the low FPR areas of the ROC curve with and improvement of up to 6% more
TPR over the HMM, which is the desired case for most commercial usages of real-time
authentication systems with high traffic that cannot tolerate high number of false alarms.
In addition, the LSTM with Attention has the major advantage of using one global
model per web application instead of a model per user, which in a highly preferable in
terms of memory consumption, storage, and implementation in high volume, real-time
systems.
One limitation of this work is that due to insufficient touch data, we were only able
to test our new methods on mouse data. Possible future work might focus on a touch
dynamics dataset collected from mobile users who browse the web using their mobile
devices.
References
1. Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int.
J. Biometrics 1(1), 81–113 (2008)
2. Revett, K., Jahankhani, H., de Magalhães, S.T., Santos, H.M.D.: A survey of user authenti-
cation based on mouse dynamics. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.)
ICGeS 2008. CCIS, vol. 12, pp. 210–219. Springer, Heidelberg (2008). https://doi.org/10.
1007/978-3-540-69403-8_25
3. Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In:
Proceedings of the 6th ACM Symposium on Information, Computer and Communications
Security, pp. 476–482, March 2011
4. Levi, M., Allouche, Y., Kontorovich, A.: Advanced analytics for connected car cybersecurity.
In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1–7. IEEE, June
2018
5. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics.
ACM Trans. Inf. Syst. Security (TISSEC) 5(4), 367–397 (2002)
6. Lau, E., Liu, X., Xiao, C., Yu, X.: Enhanced user authentication through keystroke biometrics.
Comput. Network Secur. 6 (2004)
7. Gunetti, D., Picardi, Claudia: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur.
(TISSEC) 8(3), 312–347 (2005)
8. Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE
Trans. Cybernetics 44(4), 458–472 (2013)
9. Monaco, J.V., Bakelman, N., Cha, S. H., Tappert, C.C.: Recent advances in the development
of a long-text-input keystroke biometric authentication system for arbitrary text input. In:
2013 European Intelligence and Security Informatics Conference, pp. 60–66. IEEE, August
2013
14 M. Levi and I. Hazan
10. Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE
Trans. Depend. Secure Comput. 4(3), 165–179 (2007)
11. Awad, A., Ahmed, E., Traore, I.: Anomaly intrusion detection based on biometrics. In:
Proceedings of the IEEE (2005)
12. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via
mouse dynamics. Inf. Sci. 201, 19–36 (2012)
13. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of
the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8,
October 2004
14. Shen, C., Cai, Z., Guan, X., Du, Y., Maxion, R.A.: User authentication through mouse
dynamics. IEEE Trans. Inf. Foren. Secur. 8(1), 16–30 (2012)
15. Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security,
pp. 139–150, October 2011
16. Shen, C., Cai, Z., Guan, X.: Continuous authentication for mouse dynamics: a pattern-growth
approach. In: IEEE/IFIP International Conference on Dependable Systems and Networks
(DSN 2012), pp. 1–12. IEEE (2012)
17. Kimon, L.B., Mirsky, Y., Rokach, L., Shapira, B.: Utilizing sequences of touch gestures for
user verification on mobile devices. In: Phung, D., Tseng, V.S., Webb, G.I., Ho, B., Ganji, M.,
Rashidi, L. (eds.) PAKDD 2018. LNCS (LNAI), vol. 10939, pp. 816–828. Springer, Cham
(2018). https://doi.org/10.1007/978-3-319-93040-4_64
18. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of
touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf.
Foren. Secur. 8(1), 136–148 (2012)
19. Feng, T., Liu, Z., Kwon, K.A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile
authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for
Homeland Security (HST), pp. 451–456. IEEE, November 2012
20. Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authen-
tication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer
Vision, pp. 207–214. IEEE, January 2015
21. Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on
mobile devices: recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4),
49–61 (2016)
22. Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: Tips: context-aware implicit user identification
using touch screen in uncontrolled environments. In: Proceedings of the 15th Workshop on
Mobile Computing Systems and Applications, pp. 1–6, February 2014
23. Levi, M., Hazan, I.: User profiling using sequential mining over web elements. In: 2019 IEEE
10th International Conference on Biometrics Theory, Applications and Systems (BTAS),
Tampa, FL, USA, pp. 1–6 (2019). https://doi.org/10.1109/btas46853.2019.9186005
24. Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural net-
works. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing,
pp. 6645–6649. IEEE, May 2013
25. Sak, H., Senior, A.W., Beaufays, F.: Long short-term memory recurrent neural network
architectures for large scale acoustic modeling (2014)
26. Chen, T., Xu, R., He, Y., Wang, X.: Improving sentiment analysis via sentence type
classification using BiLSTM-CRF and CNN. Expert Syst. Appl. 72, 221–230 (2017)
27. Antal, M., Egyed-Zsigmond, E.: Intrusion detection using mouse dynamics. IET Biometrics
8(5), 285–294 (2019)
Deep Learning Based Sequential Mining for User Authentication in Web Applications 15
28. Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements
curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015. LNCS,
vol. 8936, pp. 111–122. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14442-
9_10
29. Tan, Y.X.M., Binder, A., Roy, A.: Insights from curve fitting models in mouse dynamics
authentication systems. In: 2017 IEEE Conference on Application, Information and Network
Security (AINS), pp. 42–47. IEEE, November 2017
30. Yang, Y., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: BehaveSense: Continuous authentication
for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Netw. 84, 9–18 (2019)
31. Jain, A., Kanhangad, V.: Exploring orientation and accelerometer sensor data for personal
authentication in smartphones using touchscreen gestures. Pattern Recogn. Lett. 68, 351–360
(2015)
32. Ngyuen, T., Voris, J.: Touchscreen biometrics across multiple devices. In: SOUPS (2017)
33. Paszke, A., et al.: Automatic differentiation in pytorch (2017)
34. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.
6980 (2014)
An Interoperable Architecture for Usable
Password-Less Authentication
1 Introduction
Passwords are the de facto standard for authentication from e-commerce to
online banking, yet they are a weak form of authentication [29]. To strengthen
them, current advice [15,27] focuses on making passwords more complex (but not
too complex), avoiding password re-use (cf. [17]) and expiry, reducing the number
of passwords we use and using password managers, for example LastPass [22].
These measures are designed to balance security with usability, where usability
c Springer Nature Switzerland AG 2020
A. Saracino and P. Mori (Eds.): ETAA 2020, LNCS 12515, pp. 16–32, 2020.
https://doi.org/10.1007/978-3-030-64455-0_2
An Interoperable Architecture for Usable Password-Less Authentication 17
is crucial in ensuring that we achieve acceptable levels of security. For the general
population, however, only a minority of people appear to know how to protect
themselves online [2], and hackers take advantage of this with 65% of malicious
groups using phishing as their prime attack vector [32]. In simple terms there-
fore, passwords are easy to use but offer far lower levels of security than we need,
especially for accounts that require stronger security, such as a user’s prime email
account or for online banking. The weaknesses of passwords make it desirable
to replace them with stronger, password-less techniques which cannot so readily
be subject to phishing attacks. In this paper we explore why password-less tech-
nologies are not being widely adopted and propose an architecture which can be
used to unify existing password-less technologies and standards to make them
interoperable in order to overcome their limitations and to help drive adoption.
Contributions: in this paper we review the barriers to adoption of password-less
authentication technologies and propose how these barriers might be overcome.
Our approach is to take advantage of the usability of password-less technologies,
but to overcome issues of deployment to make them available for the general
population through a unified architecture that provides an interoperable app-
roach to password-less authentication adhering to the published standards [5].
We outline how the architecture can be designed, such that with strong security,
trust and usability, we can help drive adoption.
In Sect. 3 we describe password-less authentication solutions and the user and
business barriers to adoption. In Sect. 4 we propose how the technical barriers can
be overcome through architectures that can be used to unify current and future
standards-based password-less solutions. These architectures are described in
Sects. 4.1 and 4.2 and we consider the trust assumptions and threats related
to these architectures in Sect. 4.3. In Sect. 5 we consider how the architectures
might be used by users and how this will affect how the systems are designed.
Finally in Sect. 6 we conclude with the required next steps.
2 Background
To strengthen password authentication, multi-factor authentication (MFA) or
(its more common subset) two-factor authentication (2FA) has been used, along-
side password blacklists and throttling with lockouts [15,27]. Yet while these
methods can improve security and, in particular, studies have found 2FA to
offer acceptable levels of usability (cf. [31]), even here these extra measures can
still be attacked because they rely on something that we know (or write down).
For example, some systems still use the far weaker two-step verification which
requires the user to provide two pieces of information that they know, such as
a password and memorable data, both of which can be compromised in the
same way through phishing (cf. [28]). To correctly implement MFA, systems
should require that a user provide information from two or more independent
factors: 1) something they know, 2) something they have or 3) something they
are [15]. However, even here, 2FA in particular can be compromised, for example
weaknesses arise when users combine both independent factors into a single
18 M. Casey et al.
device (logging in from a phone which also receives the text message), or when the
second factor is intercepted (text messages can be re-directed by compromising
the telecommunications provider [21]).
While MFA provides stronger security compared to passwords alone, a big-
ger problem however is the lack of uptake of this and similar technologies. For
example, in 2018 Google reported that less than 10% of users were using 2FA
for their Google accounts [25].
For businesses, one of the drivers causing adoption of stronger authentication
is the increasing cost of data breaches, with a global average cost per breach of
$3.92m [18], a rise in cost by 12% over 6 years, and with one survey reporting
that 94% of businesses cite that data breaches in the previous 12 months have
influenced their security policies [33]. With malicious attacks causing 51% of
data breaches in 2019 [18], businesses need stronger protection. In general, 58%
of organisations believe that 2FA is the most likely access control tool which will
be used to protect their systems [33], while 49% believe it is single sign-on and
47% biometric authentication. This shows that stronger access controls are being
adopted, with one survey in 2019 [34] reporting 60% of organisations using 2FA or
password-less technologies, and a further 29% looking at adoption or expansion
of these technologies. However, 26% also cite complex implementation challenges,
26% customer friction and 10% expense as barriers to adoption.
Registration Login
(1) user registers user requests access
(2) server sends challenge data server sends challenge data
(3) challenge passed to authenticator challenge passed to authenticator
(4) user verification user verification
(5) authenticator generates key pair authenticator signs the challenge
(6) public key and attestation sent to server response sent to server
(7) server validates response server validates response
the corresponding phone [3]. So, while either type of authenticator offers strong
security and improved usability over passwords their different capabilities are
confusing, and this prevents adoption.
This highlights that usability is only one aspect which affects adoption of
password-less authentication. Bonneau et al. [6] developed a wider, subjective
framework for the comparison of password and password-less authentication
methods and their properties. Crucially, this included deployability and secu-
rity, as well as usability. They concluded broadly that usability and security
can be improved through measures such as single sign-on (reducing the need
for multiple passwords), but that of the technologies surveyed, most were an
improvement in security relative to passwords. However, they also highlighted
that every alternative was harder to deploy in some way. Specifically, they were
less accessible, more expensive, less compatible with browsers or servers, less
mature or proprietary. This is backed up by a study on secure communications
tools, which found that usability is not the prime barrier to adoption, but that
interoperability, low quality, lack of trust and misunderstanding were also fac-
tors [1]. Password-less solutions offer far greater security only if such technologies
are actually used, therefore how they are implemented and deployed is just as
crucial.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com