A Security and Usability Analysis of Local Attacks Against FIDO2

08/06/2023
by   Tarun Kumar Yadav, et al.
0

The FIDO2 protocol aims to strengthen or replace password authentication using public-key cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote attackers that compromise a password or attempt to phish the user. In this paper, we explore threats from local attacks on FIDO2 that have received less attention – a browser extension compromise and attackers gaining physical access to an HSK. Our systematic analysis of current implementations of FIDO2 reveals four underlying flaws, and we demonstrate the feasibility of seven attacks that exploit those flaws. The flaws include (1) Lack of confidentiality/integrity of FIDO2 messages accessible to browser extensions, (2) Broken clone detection algorithm, (3) Potential for user misunderstanding from social engineering and notification/error messages, and (4) Cookie life cycle. We build malicious browser extensions and demonstrate the attacks on ten popular web servers that use FIDO2. We also show that many browser extensions have sufficient permissions to conduct the attacks if they were compromised. A static and dynamic analysis of current browser extensions finds no evidence of the attacks in the wild. We conducted two user studies confirming that participants do not detect the attacks with current error messages, email notifications, and UX responses to the attacks. We provide an improved clone detection algorithm and recommendations for relying part

READ FULL TEXT
research
08/06/2019

After You, Please: Browser Extensions Order Attacks and Countermeasures

Browser extensions are small applications executed in the browser contex...
research
05/30/2019

DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

In this paper, we address an unsolved problem in the real world: how to ...
research
01/10/2019

EmPoWeb: Empowering Web Applications with Browser Extensions

Browser extensions are third party programs, tightly integrated to brows...
research
11/14/2018

Tropical cryptography II: extensions by homomorphisms

We use extensions of tropical algebras as platforms for very efficient p...
research
05/19/2023

Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API

The Chromium open-source project has become a fundamental piece of the W...
research
07/30/2018

Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

Over the last years, considerable attention has been given to the privac...
research
11/28/2017

Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages

Although the ADS-B system is going to play a major role in the safe navi...

Please sign up or login with your details

Forgot password? Click here to reset