Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SP.2012.10guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Framework to Eliminate Backdoors from Response-Computable Authentication

Published: 20 May 2012 Publication History

Abstract

Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have long been threatened by malicious developers who can plant backdoors to bypass normal authentication, which is often seen in insider-related incidents. A malicious developer can plant backdoors by hiding logic in source code, by planting delicate vulnerabilities, or even by using weak cryptographic algorithms. Because of the common usage of cryptographic techniques and code protection in authentication modules, it is very difficult to detect and eliminate backdoors from login systems. In this paper, we propose a framework for RCA systems to ensure that the authentication process is not affected by backdoors. Our approach decomposes the authentication module into components. Components with simple logic are verified by code analysis for correctness, components with cryptographic/ obfuscated logic are sand boxed and verified through testing. The key component of our approach is NaPu, a native sandbox to ensure pure functions, which protects the complex and backdoor-prone part of a login module. We also use a testing-based process to either detect backdoors in the sand boxed component or verify that the component has no backdoors that can be used practically. We demonstrated the effectiveness of our approach in real-world applications by porting and verifying several popular login modules into this framework.

Cited By

View all
  • (2023)Backdoor Detection Based on Static Code Analysis and Software Component AnalysisProceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management10.1145/3656766.3656967(1120-1124)Online publication date: 24-Nov-2023
  • (2014)DeTrustProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660289(153-166)Online publication date: 3-Nov-2014
  • (2013)Towards reducing the attack surface of software backdoorsProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516716(851-862)Online publication date: 4-Nov-2013
  • Show More Cited By
  1. A Framework to Eliminate Backdoors from Response-Computable Authentication

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SP '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy
      May 2012
      600 pages
      ISBN:9780769546810

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 20 May 2012

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Backdoor Detection Based on Static Code Analysis and Software Component AnalysisProceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management10.1145/3656766.3656967(1120-1124)Online publication date: 24-Nov-2023
      • (2014)DeTrustProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660289(153-166)Online publication date: 3-Nov-2014
      • (2013)Towards reducing the attack surface of software backdoorsProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516716(851-862)Online publication date: 4-Nov-2013
      • (2013)Preventing backdoors in server applications with a separated software architectureProceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-642-39235-1_12(197-206)Online publication date: 18-Jul-2013

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media