Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

11/23/2022
by   Mihai Christodorescu, et al.
0

Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve such issues, we propose an application authentication, where we rely on unique and distinguishable application's behavior to lock the key during a setup phase and unlock it for authentication. Our system add a fuzzy-extractor layer on top of current credential authentication systems. During a key enrollment process, the application's behavioral data collected from various sensors in the network are used to hide the credential key. The fuzzy extractor releases the key to the server if the application's behavior during the authentication matches the one collected during the enrollment, with some noise tolerance. We designed the system, analyzed its security, and implemented and evaluated it using 10 real-life applications deployed in our network. Our security analysis shows that the system is secure against client compromise, vault compromise, and feature observation. The evaluation shows the scheme can achieve 0 percent False Accept Rate with an average False Rejection Rate 14 percent and takes about 51 ms to successfully authenticate a client. In light of these promising results, we expect our system to be of practical use, since its deployment requires zero to minimal changes on the server.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/17/2018

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Some of the main challenges towards utilizing conventional cryptographic...
research
09/14/2022

Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme

Continuous authentication has been proposed as a complementary security ...
research
04/23/2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

Personal cryptographic keys are the foundation of many secure services, ...
research
03/27/2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices

Implantable medical devices (IMDs), including pacemakers, implanted card...
research
01/22/2020

An authentication protocol based on chaos and zero knowledge proof

Port Knocking is a method for authenticating clients through a closed st...
research
06/27/2019

Privacy-Preserving Distributed Learning with Secret Gradient Descent

In many important application domains of machine learning, data is a pri...
research
08/10/2022

Multi-Factor Key Derivation Function (MFKDF)

We present the first general construction of a Multi-Factor Key Derivati...

Please sign up or login with your details

Forgot password? Click here to reset