Vanquishing Voyeurs: Secure Ways to Authenticate Insecurely
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 122 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/40528 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
DEF CON 19114 / 122
3
5
10
11
12
22
23
24
30
31
32
38
43
46
47
49
51
54
56
59
60
62
71
73
76
84
85
88
92
93
96
97
98
104
106
109
112
113
115
119
00:00
AuthenticationoutputComputer networkAuto mechanicPasswordIntegrated development environmentRow (database)Radical (chemistry)Process (computing)State observerData transmissionRemote procedure callKey (cryptography)SoftwarePasswordInterface (computing)Social classPerspective (visual)Natural numberCategory of beingDependent and independent variablesPersonal identification numberFeedbackInformation securityUser interfaceAuthenticationoutputType theoryComputer animation
02:17
PasswordAreaPersonal digital assistantCognitionInterface (computing)Computer networkAsynchronous Transfer ModePersonal identification numberRadio-frequency identificationPlastikkarteQuicksortStatisticsPasswordInformation securityAuthenticationMereologyPhysical systemCategory of beingInteractive televisionFingerprintMathematicsEncryptionShape (magazine)NeuroinformatikCognitionBiostatisticsClassical physicsToken ringStructural loadVideoconferencingRemote procedure callInformationTouchscreenCheat <Computerspiel>State observerKey (cryptography)Radical (chemistry)SoftwareEndliche ModelltheorieImplementationVulnerability (computing)Metropolitan area networkGame controllerVirtual machineAsynchronous Transfer ModeInterface (computing)Interface (computing)User interfaceRow (database)Uniqueness quantificationStaff (military)Perspective (visual)Message passingRight angleComputer animationLecture/Conference
08:22
Interface (computing)Information securityDifferent (Kate Ryan album)Default (computer science)Shift operatorStrategy gameAxiom of choiceoutputTelecommunicationMereologyKey (cryptography)SicEstimationPasswordSequenceData modelFeedbackForm (programming)Physical systemInteractive televisionDecimalType theoryPersonal identification numberNumbering schemeAsynchronous Transfer ModeDigitizingInterface (computing)HoaxModal logicMagnetic stripe cardArithmetic meanExterior algebraMechanism designGraphics tabletGame theoryPhysical systemKey (cryptography)State observerRadical (chemistry)MereologyOperator (mathematics)Element (mathematics)PhysicalismWebsiteExtension (kinesiology)Multiplication signOverlay-NetzData transmissionTelecommunicationMultiplicationRight angleFingerprintPower (physics)Normal (geometry)Endliche ModelltheorieDifferent (Kate Ryan album)Self-organizationoutputPasswordComputer hardwareInjektivitätPlastikkarteTouch typingUser interfaceSide channel attackSequenceWireless LANPresentation of a groupSound effectInformationInformation securityGame controllerPrototypeTouchscreenPulse (signal processing)Series (mathematics)Analytic continuationPerspective (visual)WordTransmissionskoeffizientVibrationPunktgruppeCasting (performing arts)Selectivity (electronic)Hecke operatorKeyboard shortcutComputer animation
14:08
Key (cryptography)Computer hardwareSoftwarePasswordConnected spaceGraphical user interfaceComplete metric spaceoutputGame controllerTelecommunicationSerial portData modelRule of inferenceCorrespondence (mathematics)Physical systemInformation securityStandard deviationNumerical digitNetwork topologyPerformance appraisalObservational studyGauge theoryInterface (computing)Software testingPattern recognitionBit rateRevision controlError messageAveragePersonal identification numberCondition numberPrototypeRandomizationRandom numberPersonal digital assistantMedianTask (computing)AuthenticationVarianceWorkloadHybrid computerWechselseitige InformationSystem programmingPairwise comparisonProcess (computing)Shift operatorMobile WebVisual systemInterface (computing)DigitizingPower (physics)Forcing (mathematics)Error messageLink (knot theory)ResultantSlide ruleRevision controlMultiplication sign1 (number)Variable (mathematics)Numbering schemePersonal identification numberAsynchronous Transfer ModeState observerComplex (psychology)Shift operatorElement (mathematics)Observational studyLevel (video gaming)Interface (computing)Right angleModal logicNumerical digitUser interfaceStandard deviationSimplex algorithmKey (cryptography)LengthTelecommunicationTouch typingVisualization (computer graphics)Moment (mathematics)LoginTrailDecimalOverhead (computing)SurfaceCollaborationismTouchscreenAndroid (robot)MeasurementSet (mathematics)Interface (computing)PasswordFeedbackInformation securityFunction (mathematics)WorkloadVibrationOrder (biology)Different (Kate Ryan album)SoftwareCondition numberAuthenticationRandom matrixNumeral (linguistics)Form (programming)Computer hardware
20:15
PasswordInterface (computing)SequencePersonal identification numberSet (mathematics)Graphical user interfacePhysical systemRandom numberDemo (music)Pattern recognitionError messageBit rateSoftware testingObservational studyPerformance appraisalGauge theoryInterface (computing)Task (computing)AuthenticationInformation securityNumerical analysisNumerical digitStandard deviationAlphabet (computer science)Arithmetic meanSound effectMach's principleHash functionSimilarity (geometry)System programmingCognitionNumbering schemeDirection (geometry)outputAlphabet (computer science)Normal (geometry)DigitizingNumbering schemePulse (signal processing)Forcing (mathematics)Mobile WebInterface (computing)Modal logicPasswordInformation securityVibrationVideoconferencingDialectBit rateIntegrated development environmentPattern languageError messageFunction (mathematics)Software testingObservational studyDecimalResultantPoint (geometry)CountingRevision controlUsabilityOrder (biology)State observerDistanceSequencePersonal identification numberPattern recognitionHydraulic motorPrice indexLengthTouchscreenBEEPBijectionVarianceRight angleExterior algebraLevel (video gaming)OntologyInterface (computing)2 (number)Element (mathematics)SubsetCovering spaceNoise (electronics)Computer animation
25:40
PlanningObservational studyPasswordPattern recognitionError messageHypothesisPersonal identification numberoutputKolmogorov complexityModal logicFreewareWorkloadPhysical systemTask (computing)Numerical digitPairwise comparisonSystem programmingComa BerenicesMereologySoftwareCore dumpDigital rights managementWorld Wide Web ConsortiumComputer-generated imageryMeta elementGauge theoryCloud computingNeuroinformatikError messageConfiguration spacePhysical systemPhysicalismData miningAuthenticationDigitizingPersonal identification numberWebsiteKeyboard shortcutPattern recognitionKey (cryptography)Workload2 (number)Element (mathematics)CountingMultiplication signType theoryDegree (graph theory)MereologySoftware testingComputer hardwareProper mapPasswordSoftwareRadical (chemistry)Level (video gaming)User interfaceInternetworkingGame controllerWeb 2.0Arithmetic meanWeb browserSoftware protection dongleObservational studyState observerMechanism designDefault (computer science)MalwareBitEmailVirtual machineInterface (computing)Bit rateMedical imagingInformation securityInformationMessage passingTrailRight angleModal logicToken ringCodeNumbering schemeFrequencyService (economics)ResultantOrder (biology)Closed setStructural loadScripting languageTouchscreenHypothesisInternet service provider
33:43
NumberSeifert fiber spaceComputer configurationPersonal digital assistantWebsiteForm (programming)Graphics tabletTrojanisches Pferd <Informatik>Type theoryHookingLoginBasis <Mathematik>Term (mathematics)Keyboard shortcutPhysicalismElement (mathematics)Limit (category theory)Internet forumMalwareWeb pageMultiplication signInterface (computing)Radical (chemistry)Substitute goodPasswordAuthenticationWeb browserScripting languageLengthMechanism designForcing (mathematics)User interfaceTelebankingSoftware protection dongleBitSoftware developerASCIIQuicksortMappingGraphical user interfaceTouchscreenField (computer science)WindowWeb 2.0Single-precision floating-point formatCodeMedical imagingAreaKey (cryptography)Operator (mathematics)WebsiteVirtual machineDatabase transactionProcess (computing)Personal identification numberSoftwareMotion captureCASE <Informatik>Computer configurationMetropolitan area networkContent (media)Alphabet (computer science)Different (Kate Ryan album)EmailEvent horizonGraphics tabletRight angleGame controllerAxiom of choiceDigitizingCombinational logicForm (programming)EncryptionInjektivitätNeuroinformatikOcean currentWritingSpherical cap
41:46
Key (cryptography)Axiom of choiceSet (mathematics)Asynchronous Transfer ModeInfinite conjugacy class propertyMereologyoutputComputer hardwareFile Transfer ProtocolNumbering schemePasswordTelecommunicationPersonal identification numberInterface (computing)EncryptionLie groupRevision controlCircleTouchscreenPosition operatorInteractive televisionKey (cryptography)Web 2.0Set (mathematics)Rule of inferenceMultiplication signPasswordSheaf (mathematics)CountingIdeal (ethics)Web pageService (economics)Side channel attackFehlerschrankeInterface (computing)AuthenticationRadical (chemistry)Generic programmingInformationVisualization (computer graphics)Element (mathematics)Power (physics)Graphics tabletComputer hardwareKeyboard shortcutDifferent (Kate Ryan album)Row (database)Numbering schemePersonal identification numberAsynchronous Transfer ModeExpected valueDirection (geometry)Type theoryFunction (mathematics)String (computer science)LoginSpacetimeMotion captureReading (process)Point (geometry)PredictabilityModal logicProcess (computing)TelecommunicationPhysicalismSingle-precision floating-point formatFormal languageRight angleView (database)State observerPrototypeBit rateEntire functionVideoconferencingDistancePhysical systemConstraint (mathematics)Observational studyGroup actionLengthUniverse (mathematics)Web browserData transmissionOrder (biology)Graph coloringAxiom of choiceVector potentialMicrocontrollerError messageProper mapMetropolitan area networkComputer animation
49:49
PasswordPersonal identification numberAuthenticationVector potentialInformation securitySystem programmingSoftwareComputer hardwareHacker (term)State observerPlanningMultiplication signService (economics)Revision controlField (computer science)Radical (chemistry)Physical systemInsertion lossComputer hardwarePersonal identification numberPasswordVector potentialInternet service providerInformation securityWebsiteKey (cryptography)SoftwareComputer animation
Transcript: English(auto-generated)
00:00
My talk is gonna be about more secure ways to authenticate in insecure environments. So addressing from a user interface perspective some of the problems with passwords and PINs. And there are two names there and anyone that came here expecting that there would be a hot girl
00:20
accompanying me giving this talk are doubly disappointed because Andrea is not a girl. He's Italian, so it's an Italian name and he couldn't make it. A lot of this talk is Andrea's PhD work at KAIST. I'm a visiting professor occasionally at KAIST in South Korea and I thought that DEF CON would be very interested
00:40
in Andrea's work and I was hoping that he would be able to come too but he has to finish his PhD at the end of this summer and he's taking four hours a day of Korean classes because he's a masochist and so he just couldn't make it. But he joins us in spirit and he'll be very excited to get feedback from the DEF CON and the security communities about this work.
01:02
So an overview of the whole hour long talk. First of all, some key features of password and PIN authentication and the nature of the observation threat. Then three categories of threat and response. And our concern here is primarily interface design. So not the idea that we can make this thing perfectly secure because we know that we can't.
01:22
But first of all, but it's gonna be about how we design interfaces that mitigate these threats in an environment where we can't completely control what's going on. So first of all, being observed from outside. So physical key entry at an insecure terminal and some mechanical and electromechanical observation resistant solutions to that problem.
01:43
Secondly, observation from within a compromised terminal. So being watched from the inside and protecting your key between your insecure input device and the network and the bank and whatever way you can secure it or you can do a better job of securing it. So subversion of recorders and loggers
02:01
and then rethinking the way that we treat passwords and enter them. So it's not just a thing that we remember that we have to physically type in somewhere. So remote entry and secure transmission to the terminal. And can we use some of these digital tools that now everyone carries?
02:22
So here are some basic authentication methods and this is what passwords are competing against, right? So a password is something that you remember versus something that you have. So a key or a RFID card or a security card or something that you have because it's part of you. A biometric statistic of some sort.
02:41
And why should you use one over the other? Everyone has advantages and disadvantages. So with passwords, the big advantages are that the information is invisible. So no one knows if you have it or not and it can be delegated. So that means you can give it to someone else. If someone needs to get in something, you can give them your password.
03:00
And delegation also includes replacement. If someone gets it, you can change it and you can maintain security. The drawback, the big drawbacks are that there's a cognitive load. You have to remember them and they're susceptible to observation. If you know what it is, it's already copied.
03:20
Tokens are also cheap like passwords and they're commonly available and you can delegate them. You can give someone your key. But it is a physical thing. They can be stolen, they can be copied, they can be lost and they can deteriorate. They can stop working. The biometrics have no cognitive load at all. You don't have to remember it. It's just something you have and people seem to kind of dig them in a certain way.
03:43
Like non-security people especially are really into them. But they're also a physical property. They can also be copied. They're a unique thing but they're not secret. People can record your fingerprints or whatever you're using as a biometric and they deteriorate. They change even as you get older. Things like the shape of your face and so on change.
04:02
Also a lot of people have severe philosophical issues against them and you can't delegate them. You can't give your finger to someone to log in on a fingerprint thing and you certainly wouldn't want to. So we like passwords because they're invisible and delegatable but the cognitive load has always been a big problem for them. And you see that so many massive breaches
04:21
don't depend on individual problems with implementation of security at the different places. They depend on the fact that people reuse multiple passwords. And they get someone's Gmail password and then suddenly they've broken into all of the critical systems that they also have access to. We tell people not to do that but they do it anyway.
04:40
So even though they're still valuable and they're gonna be with us, the big weakness is the fact that that cognitive load causes people to reuse them and they're now even more weak against observation. You need to have many of them and you need to change them frequently because they can be lost so easily. And observation is a classic attack.
05:00
It's not just in passwords and so on. So cheating at poker for example, this item that's on the screen is a fake pipe with a mirror in it for a card dealer to cheat at poker so they can see the cards that they pass across it. So a classic observation attack for a crooked individual in the system. And these observation attacks are everywhere in computing.
05:22
So they're in the human interface, external, for example, shoulder surfing or mirrors and cameras. Quick show of hands, who's ever shoulder surfed someone's password or PIN? I hope it would be most people in this room because it's so easy.
05:41
You can also dust the keypad and you can essentially shoulder surf when someone's not there, when they've already left and used the thing. There's stuff that's internal to the computer interface. So ATM skimmers are a really great example of that that have been cropping up everywhere. Key loggers. Hands up anyone that's ever used a key logger
06:00
on someone else's computer or their own. Not quite as many people because you have to be really going after someone to do it but it's still really common. And then of course, the stuff that we normally really think about, the attacks in the network. So packet sniffing, man in the middle and so on. Grabbing information once it's already in the system. And because that's so common,
06:23
there's a lot of work that's been done to mitigate that. So a lot of encryption and so on. And of course, we can secure the external and internal human interface, the stuff that faces the human, if we keep the interface private. But what about when we have to use public terminals? So public terminals are everywhere.
06:41
We see ATMs, airport kiosks, door locks, public computers and access control for facilities. You know, you probably use one pretty much every day. So let's take a closer look at one of the most common public terminals from a human interface perspective, the ATM. Where did it come from and why was it designed the way that it is?
07:00
Well, before there were ATMs, they were just the human bank teller. You went to the bank, you dealt with a human. It was a reasonably private interaction. And so, you know, when designers say we're gonna replace the bank teller for whatever reason, well, you get a machine that acts like a teller. So that's the first cash dispense in 1967.
07:21
And the early ATM concepts really replaced the interaction with the human. They had a human on a video screen. This is 1973 future teller and you can see these television tellers. They had a person somewhere else, remotely, doing a virtual shared interaction, just like the real teller. So why would you do that?
07:41
Why would you replace a human teller in person with a human teller on a video screen? Even if you look 2010, you know, we're still doing that same thing as in 1973 with a teller on a video screen for these certain tellers. Well, you wanna replicate the experience but add 24-hour availability and remote access.
08:00
But yeah, in 40 years, even though things became more automated, you didn't necessarily need a remote human staff, the basic terminal model and the interaction style didn't change. Like the teller, the terminal is a physical thing that you need to go and use and people can watch you doing that. I mean, think about what other things are we doing the same way 40 years on?
08:23
Now, there are lots of ATMs everywhere but the number of manufacturers is not super great and the interaction style is practically identical. You've got a digital decimal pin number that you type in. Interface-wise, it's like a monoculture. Everyone's basically the same. There's a place to input a token,
08:40
a place to receive cash and interface to input control information including that secret information. And even when a company like IDEO, which I think is the world's biggest design firm, tries to reinvent the ATM, it ends up looking slick. To me, it kinda looks like a urinal but it still has essentially the same interface elements. It's still got that screen and that pin code pad.
09:04
So their ATM of the future, as envisaged in the last couple of years, is still not too different from the concept from nearly 40 years ago. From a security perspective, what's really important about this interaction design that's had remarkable staying power is that it's physically situated
09:22
and therefore easily attackable with physical methods such as shoulder surfing and mechanized observation like ATM skimming. Hopefully everyone here has been keeping up to some extent with the effect that low-cost hardware is having on ATM attacks and the proliferation of sophisticated skimming operations. There was even a fake ATM installed at DEF CON
09:43
here a couple of years back. Well, not here at the RIV but someone set up a fake ATM and waited to see if people would try to use it. We got mag stripe readers, wireless transmitters, cameras. They're also cheap now that you can make something like this that's essentially disposable.
10:01
When it gets found, you're gonna lose it but it'll pay for itself in just a couple of skimming operations. Criminal organizations manufacture injection molded, keypad and card reader overlays and so on for common ATMs like a lot of the most common national cash register models and you can buy them on sketchy crime sites for like a thousand dollars. Every time I go to an ATM now,
10:21
I really look for a skimmer not just to make sure I don't use it because I really wanna find one in the wild and I wanna get it and take it apart. I haven't been lucky enough to do that yet but hopefully one day I will. And they use methods of observation like cameras to see people type in their pin codes, also wireless transmission from the pin pad overlays and so on.
10:40
And then down there in the lower right is an electronic door lock which they love in Korea. Like they're on basically every door but they're super susceptible to observation because you can see the fingerprints on the commonly used buttons or you can add something else that gets wiped off when people use it, you can tamper with it. So there's definitely a threat to using a public terminal.
11:02
And all of these attacks work because the attacker knows in advance how the pin is gonna be entered. So quite a few researchers in the human interface community have suggested alternative methods of pin entry. So for example, pin pads that move around and you have to play like kind of a game so the interaction is not so easy to replay.
11:21
Spy resistant keyboards, so you can't tell which of the keys someone's selecting because there's multiple different colored keys, characters on a key. Gaze based password entry, so the idea is if you're not looking directly at the person, you can't see how they're moving their eyes around to log in. And then haptic password entry
11:40
which is some stuff that Andrea has been working on. So this is things that you feel. Haptic is using the modality of touch. But despite all this, key pads are still the norm. So here's the basic considerations of the stuff that we've been looking at. We accept the need to use public terminals. It's not gonna go away.
12:00
But it doesn't mean that we have to all do it the same. So we wanna be able to mix up password entry mechanisms to make the system less of a monoculture and less easy for one attack to get everything. Doesn't mean we have to use the interface we're given. So we wanna give users the power to improve their own interface security, not just be dependent on whatever the organization offers.
12:21
And we wanna revisit the assumption that all interaction has to happen at the terminal. Even if it's a physical terminal that you've gotta use, all of that interaction doesn't have to happen there. So we wanna move from a mode where everything is done one way at the terminal, subject to observation, and replace it with a way that things can be done lots of different ways.
12:41
The input is mediated at the terminal in an observation-resistant fashion. So in other words, to decouple the interaction, to separate the input method from the communication to the terminal. So part one, observation, new alternatives for physical key entry to avoid observation at the terminal physically.
13:02
And the basic idea, which I'll present various methods here, is a haptic password. Or the basic idea really is a side channel that's not visual and is less easily observable. And one of these is haptics. So first off, a haptic keypad. And haptics are observation-resistant because the sensor modality is less leaky.
13:21
People have a harder time feeling what you feel than seeing what you see. And so we have these, in this work, there's a series of tactile cues, or tactons, that you feel at the fingertips, and they're inherently invisible to someone that's watching you use them. So in this system, we have three possible tactons.
13:43
A continuous buzz, or continuous vibration, a one-hertz pulsing, and a two-hertz pulsing. And these different modes are pretty easily distinguishable with the fingers. And so you can make a password out of a sequence of these tactons. And here's the prototype of a haptic keypad that uses them. Quite simple hardware.
14:01
There's an Arduino that does all the work. And then the haptic keys each have a vibrotactile element and a sensing element. So here's what the keys look like closer. There's a force sensing resistor for adjusting the output of the vibrotactile element. And there's a switch for registering a key press. And then the actual vibrotactile motor
14:21
that makes the vibration. And there's visual feedback in the interface of how far along that you are in the password, but nothing that indicates what was entered, just how many things were pressed. So how it works is the three tactons are always assigned to the three keys with a one-to-one correspondence, but in a random order.
14:41
So even if someone sees the way your fingers move, they can't do a replay attack. You fill all three keys and you select the one that corresponds to the right tacton in your password, and then click the key. Repeat for as long as the password goes. So press down, so it won't do it if your fingers aren't on the keys, so you're obscuring the vibrational elements.
15:02
Fill the three tactons, select the right one, and then they get randomly reassigned and you go along through the stages of the password. Now there's three separate tactons, so that means that the password essentially forms a trinary code, like binary, but with three possibilities. And the probability of a guessing attack on any password
15:22
is one over the number of possibilities to the number of unknown, to the power of the unknown digits in the pin. So if we have a standard numerical password for decimal digits, that's a one in 10,000 probability of a brute force success per attempt. So it's clear that with a haptic pin with three tactons,
15:42
then our pin is gonna need to be longer than a decimal pin. So this is maybe gonna be a little weird for the DEF CON audience. In the human interface community, we do user studies to see if things would work or not, which basically means you round up anyone that's near the lab and give them $10 or an ice cream voucher to come and play
16:00
with your device for a while. And I'm gonna skip through these pretty quick, but if you're interested, then links to the papers and more details are on the set of slides that's on the DEF CON DVD. So we did a pilot study, or Andrea did a pilot study to first evaluate whether the tactons are perceptually distinct or not. So can people recognize them?
16:20
And in the second study, if the hardware works, then can it be used effectively for authentication? So the result of the pilot study was people could recognize them very easily. There were no errors. And then from, so that led to the user study in which there were three experimental conditions
16:41
to evaluate different versions of the software in different pin lengths. So the first two conditions, first of all, a six digit pin, which is not secure to the standard of a four digit decimal pin, but it's relatively memorable. And then a nine digit one which does conform to that brute force attacks security level.
17:04
It's worth noting that 729 is not considered secure by the standards of the four digit pin, but it's not that much fewer than a simplex lock which has been used all over the place. So a trade off between password length and performance. Then if we assume that brute force attacks
17:21
are not a problem because it's electronic and the device won't let you make hundreds of attempts, at least in a reasonable time, then we can resist observation and not worry so much about brute force by doubling the number of trials for each pin digit if instead of pressing the right tacton you press both wrong ones. So it makes it harder to observe what someone's doing
17:40
because there's more presses going on, but the brute force resistance is the same, but that gives you a higher observation resistance. So a trade off of complexity versus performance. So the results from this user study showed first of all that the different methods did take different amounts of time, as you would expect a longer pin takes longer to enter,
18:00
but the hybrid mode entering the incorrect ones, even though it's a six digit one, took even longer, but there are 12 entries instead of six. The number of errors was not significant, but possibly due to the high amount of variability of the study. And then there was also a NASA TLX workload measurement
18:22
done to see what the mental workload was, and it showed that the hybrid mode was much more difficult to keep track of mentally. So using the six digit tactile pin as a reference, the nine digit one was not more challenging for users in a workload sense. Remembering a nine digit tactile pin was easy enough to remember,
18:42
and didn't provide significantly more error, whereas the hybrid mode, there's a lot to think about, there was a higher overhead and it did take longer. And that was compared with a different haptic password entry method that I mentioned earlier, and it performed better.
19:01
So that's a method that can be used when you have a physical keypad. But what about unlocking these new interactive devices that we have? There's been a shift in the way that we compute over the last 40 years from private user to these public collaborative interfaces like surfaces, and to mobile devices.
19:22
And we still need to log into them. So we've got large screens, we've got public spaces, so shoulder surfing is as useful, if not more so, for pin theft than it ever was. It's almost hard not to shoulder surf people's mobile phone pins, especially when people use that Android swipe thing. Like, you can't see someone log in and not remember it. It just drives you nuts.
19:42
So it just remains one of the most common ways to steal one. So it'd be great if we had an invisible pin entry method that could use an alternate sensory modality, just like the haptic keypad. But should it be audio or touch? And we can write off smell and taste, I think, for the moment.
20:00
So previously, Andrea had done a interface with a rotary wheel where you searched for a tecton by spinning this wheel and then selected it. So kind of like a knob interface to the tectal keypad. So this is the same kind of tectons
20:23
and a 3D printed knob with a vibrotactile element, and you just kind of spin it and search for the one that's the right one, press the button to enter, and move on to the next one. Now, with mobile phones, we have vibration motors in them, we can do the tectons, and we also have audio output.
20:41
So for a numeric pin, we could use text-to-speech to actually speak out those numbers. So we have a sequence of cues, either auditory or tectal, that can be invisible to everyone if headphones are used for the audio. But if we want to compare haptic and auditory cues for decimal pins, then we need more tectons. So we made up more haptic vibration patterns
21:03
to correspond to the 10 things, and they ordered in a way that seems reasonable, right? So single pulses going to double pulses to triple pulses to continuous. So here's the touch screen version of the rotary wheel interface. 10 slots for 10 digits. They're assigned to slots with a one-to-one correspondence
21:20
preserving order but randomizing the start points for observation resistance. So you start somewhere, move around, looking for the correct number, and then select by selecting the center of the wheel to lock in that digit, move on to the next one. And then the order is re-randomized on each trial so that you can't learn anything from the previous entry.
21:42
So here's a video showing. Seven, eight, nine, zero, one, two, three, four, five, six, seven, eight, nine, zero, one, three, two, six, five, four, nine, seven, six.
22:05
So you can't tell by looking at it what the digits are that are being entered. And if you use the headphones, only the user can see what is being entered. And with the vibrotactile method, if the environment is not too quiet, then you can get away without using the headphones at all
22:21
so in a public space where there's some cover noise. So two user studies were done for this one as well. Again, a test for perceptual distinction and then a full study to compare two things. First, auditory versus haptic modality. Second, large alphabet versus small alphabet. How big of a number of digits should be involved.
22:41
Assuming that there's enough for acceptable brute force resistance. The pilot study showed some difficulties with tecton recognition with the large alphabet. So the more complex alphabet was harder to recognize, the error rate was higher. In the full study, two trade-offs were analyzed. So maintaining the same security level,
23:02
looking at, first of all, the two modalities and then a four digits from 10 alphabet and then a six digits from five. Both of them have acceptable security and the six digits one allows us to compare to the tactile keypad. So the results of that showed, first of all,
23:20
audio is much quicker than haptics, regardless of pin length. And there's, again, a lot of variance in the error such that we didn't get a statistically significant result from error rate. So overall, the audio was better than the haptics, perhaps because it's more familiar. But you have to use headphones to make it non-observable.
23:42
The error rate dropped from the main study from the pilot, because it was the same subjects we used and it seems like subjects become more experienced with the interface. So it doesn't mean that it's completely out of the question if people are gonna quickly become twice as good at it.
24:01
So overall, slightly better performing than the haptic keypad. But as we saw in these interfaces, there are basic problems from a usability standpoint. So even with the wheel style lock, a wheel or knob should be really simple, should be very intuitive. Everyone knows to spin it to go one way or the other. But with the tectons, we have to remember
24:20
and recognize all these weird vibration sensations. So what about an interface that only uses a single cue that would completely eliminate the recognition problem? So instead of recognizing and distinguishing between these multiple tectons, you just have to count. So the next one is called the spin lock, which is loosely modeled on a safe dial.
24:41
So instead of digits, the pin consists of movement offsets to the left or the right. So here it is using the auditory version. Again, observation protected when using headphones. And the thing is here, your password has to be stored in a way that's not your normal sequence of digits
25:04
because you have to remember if it's left or right. But it alternates one way or the other. You set up a password. The clicks here are just progress indicators and the beeps are the counts.
25:28
Someone who's observing can't tell how many you've gone because the distances are randomized and the start point is wherever. Once again, silent with the headphones on.
25:41
So here's a study for this one. Andrea ran them as well. Looking at three questions. Do we think it's gonna be faster to count than to recognize? Do we think it's gonna be more accurate to count than to recognize? And the third hypothesis, that counting will be a lower workload than recognition. So once again, haptic and audio-compared,
26:01
and this time pins made from either five or 10 possible digits, so possible movements to the left or the right. Each user got instructed, got to play with the interface, then do four tests and this TLX mental workload test. So as you'd expect, longer pins took longer to enter
26:21
and the haptics took a little bit longer to do than the audio, but not a lot. A little bit more error-prone for haptics and audio as well also not a lot, but statistically significant. The workload one was interesting. Once again, the haptic interface was more
26:40
cognitively demanding than the audio. So people still had to kind of think about it a lot. But nevertheless, in post-test questioning, people preferred the haptic modality because they felt that it was more private. They didn't have to switch to the headphones. So a couple of possible explanations there. First of all, system latency can be a problem for haptics
27:01
because that motor has to spin up. And so if people are spinning the wheel fast, then they can miss the cues as they go over them. So that could be a contributor to the high error rate. Secondly, more complex pins took longer to enter, but they didn't result in worse errors. So it doesn't feel like there's an error rate
27:21
per entry of the pin. There's some kind of just overall error rate. And I think that that's because a large number of error trials involved a mistake in only one item. And the majority of those errors involve people entering a very close number of digits and then becoming aware of that and resetting the system.
27:40
So just missing that correct count and they knew to reset and start over. So it's not the same as having an authentication failure and getting frustrated and then, of course, potentially wiping your device if you have it set to wipe after a certain number of authentication fails. Came out slightly better on average than that rotary lock that came before. So we feel that simplifying the pin to a count
28:03
instead of digit recognition is faster, less error prone, and has a lower mental workload. So that's some new ideas for physical key entry at the terminal in the presence of physical observation threats like cameras and shoulder surfing. But what about when you have to use a terminal that you don't trust like a web browser that has the default computer key entry mechanism
28:22
which is a keyboard? Can we use software to help make us less defenseless against observation from within? Here's the problem with untrusted computers. As a user, you can keep your password secret. You can do everything properly. Never tell anyone, never write it down. And once it's in the system, it can be salted and hashed
28:41
and it can be used for authentication in ways that make it difficult to recover the original password. But when it comes to actually entering that password, you have to do it in the clear. You have to type in the real thing. So keystroke loggers are a major method of password observation and compromise. Last year, I gave a talk about recovering
29:00
my stolen computer and one of the tools that I used to do it was a keystroke logger. They can be in software and they can also be in hardware. You can get on sites like ThinkGeek these little hardware key loggers that read the keyboard, send it out wirelessly, and just grab whatever someone types. Now of course, malware is one of the most well-known ways
29:21
that people get their activities logged and compromised. But I don't want people to focus on malware entirely because there's lots of other ways you can come into contact with a logger. We're varying levels of quote unquote legitimacy, meaning whether it's been installed by someone that owns the computer or not. Some people install loggers to keep track of someone,
29:43
like to see if their boyfriend has been sending their email password, to see if they've been emailing other women and stuff like that. You've got jealous partners, you've got employers that do a lot of keystroke logging, governments and so on. So for the paranoid, there are lots of other ways you can get logged. Some people even install loggers on their own machine
30:02
as a matter of course, so that they can go back and see if anyone else has been using it and what they've been doing and maybe reverse-own them if they need to. So any part of the user interface can be logged. It's not just the keyboard, but it is any keystrokes, mouse clicks, screenshots of what's on the screen, and mouse movements and so on.
30:21
These are kind of in decreasing order of whether they're usually in a logger when you find a software logger. So that's why it's interesting for user interface designers to see if we can make things a bit more difficult for the attacker while not making it too much more difficult for the legitimate user. Now at the start, I mentioned that a problem with passwords is this load of having to remember
30:42
lots of them, and this leads to bad practices like reuse. So browsers and computers now often feature these password keychain features. And this has the side benefit that it reduces, I mean first of all, it means you can keep track of them all, that's the main reason. But the side benefit is that it reduces the frequency that you have to use those UI elements to actually enter a password.
31:01
A lot of times you can just click okay. So less stuff gets logged. And I noticed that when I was stalking back my own computer. But these things are no use at all on a public terminal. Because you don't want it to remember your password. And I personally, as a somewhat paranoid person, hate even using a friend's browser.
31:21
Because I don't know how they have password saving configured. It might just be remembering all passwords and mine's gonna get stuck in there with that. And then sooner or later you're gonna be on the road and you're just gonna have to use a sketchy internet cafe somewhere. It's really easy to say, I'm just never gonna do it. I'm always gonna use my own computer. But once in a while, you have to.
31:44
So authentication for accounts on the web is currently completely under the control of whoever's running the service. The mail provider, the bank, whatever. Facial book, Google, whoever. Some of them are more responsible than others and have varying degrees of protection against password theft. So the most basic that you see is forcing you to change your password every so often.
32:03
And that's essentially damage control. It limits the amount of time that a compromised password is actually useful for. Some of them have a small kind of second factor where you have to say, recognize an image before you enter a password.
32:21
Or these image based keyboards instead of your actual keyboard. But those are susceptible, well, get to that in a sec. Sometimes they have changing security questions that it asks you every time. But there's only so many of them you set up for an account. So those are loggable too.
32:41
And you actually see that a lot with the banking information stealing malware. There's an interesting one, sites like Hotmail do this. You can get a one time password which will text message you to your mobile phone. Which yeah, is pretty useful for resisting loggers but it has an unintended consequence that anyone who steals your phone
33:01
now has access to your email. You have these one time tokens, physical tokens that generate a code that you use at the same time as you use your password. And that basically does is reduces the value of the password to be stolen. You can't just use the password. So it's a good method.
33:20
But how many of those things do you wanna carry around? How many versus how many websites do you use and log into? There's some interesting stuff that's been done in especially in countries where people are very poor and don't have a lot of technical literacy such as India. And there are things like these things
33:41
they call them nonces which are disposable one time password modifiers. So this is one from India that some Microsoft researchers helped design. And so every time you wanna use your phone to bank you've gotta do this transaction in the presence of someone. So you tear off the first paper thing and you modify your PIN with this tear off thing
34:01
that you never show anyone and then you dispose of it afterwards. So you have this physical thing. But again it's a physical thing even though you could use it online and so on as well. But if you prefer one method over another you're out of luck because few sites support more than one method and in many cases none at all.
34:22
You just enter your password and you take your damn chances. So the ideal outcome would be if we as the users could choose our own software based interface that would make it harder for attackers to observe our passwords and do replay attacks and that could be used on any website at all without the participation of the website operators.
34:41
And most people in this room I'm sure already keep their own machines locked down and have various ways of protecting themselves. But we don't have so many options on a public terminal. In particular, forgetting about malware just in terms of a unscrupulous operator we have no way of telling if the operator of the machine is running a logger of some sort.
35:02
And we usually don't have permissions to install or run our own software. But if we're using these terminals to access the web we usually have the full web and we can usually access pretty much any basic web content. So the goal here is to obfuscate data entry in terms of the physical user interface elements using simple web mechanics
35:21
that aren't too tedious for the user. And if you look at forums unlike Slashdot and so on about people talking about these things or if you've used a lot of online banks then you'll see that people have thought about this and they've done various sort of hokey methods to do it. For example, copying and pasting characters
35:42
into a password field instead of typing them on the keyboard which is fine against the hardware key logger. But if you were gonna write a key logger you'd log the clipboard too, right? Banks have used this one, a on-screen keyboard or selecting characters and dragging and dropping so it's all mouse-based.
36:01
But there are also loggers out there that log the area around each mouse click. A little bit of the image doesn't take the whole screen. Alternatively, you can accept that your password is gonna make it into the logs. And you can shaft the logs by putting a lot of extraneous keys in there as well. And I feel like anyone who's really enterprising and analyzing the logs and is really writing a kick-ass logger
36:22
could timestamp the keystrokes and could pull it out pretty easily. But more importantly, this is a total pain in the ass. And users are just not gonna wanna use this. It takes a long time and it's very error-prone. Now I know that you're all thinking, well, who cares about this interface stuff anyway?
36:41
This is all bullshit zaars because there are form-grabbing malware out there, it's a man in the browser attack and there's nothing you can do about it. These types of malware hook the browser and they grab the contents of all web forms pre-encryption before it's sent off to the site and they mail it off to Russia. Examples are online banking theft trojans
37:01
like Zeus and Spy Eye. And this software is very effective. It now represents the majority of passwords stealing trojans. But I said trojans and not password thefts in general. I'm not so sure about how it compares to password theft in general and I suspect it's not as great as it is
37:22
just in terms of being limited to malware. And there are some limitations. For example, they're not multi-platform. They don't support every browser. You can see from that screenshot there that Spy Eye just in the last two months released support for Opera and Chrome under Windows. So people who use esoteric browsers and so on
37:41
may or may not be vulnerable depending on how the software developers are progressing. And there's no UI mechanism that can mitigate this tactic anyway. So for UI people, it's sort of not an interesting problem in the sense that we can do anything about it. I think there's lots of things that the browser people can do about it.
38:02
But this is interface design stuff. So I think that just because this is out there we don't just have to throw up our hands and give up and say, well, we can't protect against this anyway. There are still plenty of threats that we can mitigate. And I really wanted to mention this because if any people here don't know about these browser compromises, they should.
38:22
So you should be even more careful than normal accessing from an untrusted terminal or a machine that may have been compromised anything that involves you losing all your money because assuming you have any left with the economic collapse you can lose all your money with this stuff. So here's what we wanna do. We wanna give the user control
38:40
of that authentication interface. We wanna keep any sensitive text out of the log. Minimize the amount of other data leakage that could be done by other UI logging mechanisms. So we don't wanna even make it any easier for people to do brute force attacks. We want the logger's job to be as hard or harder
39:02
than someone who's in the room with you shoulder surfing you or camera recording you as you log in. And we want that choice to be available but still focus on usability. And support a lot of different ways to log in that people can feel comfortable with so that a single attack method doesn't work on everything
39:22
but the people will still use it. So getting this sort of ecosystem that forces attackers to do the work, make them support everything. And there's a way that we can essentially hack any website right now which is to inject JavaScript directly into the site. And that's something that's normally associated more with attacking than defense.
39:42
If you visit a malicious site they can inject JavaScript into your browser that logs all your keystrokes even though nothing's been compromised on your computer. But we can also intercept keystrokes and we can obfuscate it by injecting a known trusted script into the current webpage. So we can do all kinds of neat tricks
40:02
drawing over the active page and so on which can help us if we wanna use our powers for good instead of evil. The big difference interface wise here is now we have 95 printable characters to support instead of 10 digits or something like that. So we have to do things a little bit differently.
40:20
So here's the simplest approach. It's a visual keypad that you can bring up over any website that intercepts keystroke events and instead of clicking on it with a mouse you type the keys and it automatically performs a one time pad substitution that automatically remaps any key that you type. So you look for the,
40:41
the metaphor is for people who sort of type like I do by looking at the keyboard. You can regenerate it on a per keystroke basis which is useful because this is a method that's susceptible to screen capture but if you regenerate it on a per keystroke basis you have to capture the entire screen on every single keystroke.
41:02
Because it's a one to one mapping it will reveal your password length so it does potentially make brute force attacks slightly more easily, more easy. But the password itself is not gonna be recoverable from the text log. And you can also remap the username as well as the password if you feel like you need extra obfuscation.
41:21
It's quick to use, it's just visual search for each key. But we sort of don't like the fact that it's easy to screen cap. So here's another custom interface designed to make the screen capture problem more difficult for the attacker. It's sort of based on the idea of a code wheel, a combination style code wheel lock. Because you have a huge alphabet it's gotta be a big filthy thing
41:41
that covers half of the webpage but it's see through so you can drag it to wherever you need it and not obscure what you need to see on the webpage. It uses the mouse but no clicks are involved so it won't trigger click based screen capture. How you use it is you mouse over a red reference key which is the point that is gonna correspond
42:01
to the key that you're gonna want. Then drag the mouse around to rotate the desired output key into place and then hit any key to lock in whatever key it is that you wanna type. Basically what you're gonna see in the log is a string of whatever keys that you type. It could just be all spaces, whatever. And it intercepts additional keystrokes so if you wanna chaff the logs
42:20
to conceal your password length you can do that too. Time cast, you've got your visual search and you have this kind of animation. So here it is in action. You can see watching it that it's essentially replacing that key press information
42:40
with visual information. So it's possible to shoulder surf this method without seeing the keyboard. Although it's difficult because it's a little complex. You can try and see what password I'm entering here on this video. But it's a trade off. But you can essentially choose each method here. So you could use this one when you know
43:02
someone's not watching you over your shoulder if you're reasonably sure that the entire video session isn't being logged for example. But what we really want is a method that's resistant to shoulder surfing and screen capture as well as being resistant to keystroke logging. I haven't personally ever seen a logger that logs the audio output.
43:22
And you can use headphones to reduce the observability of the audio signal. So here's my version of Andreas Spinlock. It uses auditory stimulus based on counting just like the phone lock. But it's gotta support a full keyboard. So instead of a circle that you might have to spin around an average of around 50 keys
43:44
I figured you could look at the keyboard and then drag a handle down to select the row and then across to select the key. So here's an example. There's only a few little UI elements that you drag into place.
44:05
And you just count those clicks as you go across down and across the keyboard. You can look down at the real keyboard as you do it. Because each row of keys is shiftable there's actually two clicks per row and the top is the shifted key and the next one down is the unshifted key.
44:22
The relative positions of the clicks are randomized so even if you can see the screen you can't tell from how far the handles move what's being selected. And there are no key presses at all. It's all that audio side channel. Medium time cost. Two sets of counts per key press.
44:41
So in summary of this section the important thing about this is not those three example methods that I showed. What's important is giving people a choice of how they authenticate. Or even tools to roll their own method if they don't like what's out there and they wanna use what's best for them. Instead of just forcing them to live with the service that they're offered.
45:01
And ultimately these are just seeds for what should in an ideal system be an ecosystem of methods that are easy to implement, they're easy to choose from, they're available for users that wanna write their own in a secure, trusted fashion. Because ecosystems are more resistant to generic attacks.
45:22
We wanna offer modalities that are not traditionally logged, like audio. Because we wanna make attacks harder not because it's impossible to log audio but because if people use it then it has to be done and it makes the attacker's job harder. And these are just, these methods are just examples from a very, very large potential space
45:41
of methods that could be used. So it's like a spy needing to be fluent in every single language in order to do his job properly. Makes it harder. Imagine if everyone logged in by a different method then generic attacks would have to concentrate on the infrastructure like the browser. And then we can concentrate our defense
46:01
on those points too. We haven't done user studies on this stuff. We might, but again the point is not to pick one or two methods and say this is the best method, you should use that because then it's not customizable and we've gone back to a generic system. It's to say you have the power to choose what works for you.
46:23
And that leads me to the idea of de-situating the interaction. Especially back at the start when we were talking about ATMs, the problem with those terminals is that the interaction needs to be done at a predictable physical place with predictable hardware. And a common criticism that people level
46:40
validly against the haptic keypads and so on is that there's a reason why ATMs all use a pin pad. Everyone needs to know that the interface is gonna be the same and that they're gonna be able to log in even if it's in a foreign country or wherever. So we need to look at ways that hardware can be used to de-situate that interaction. We wanna use different pin entry schemes like the web example
47:01
but we can't expect ATM manufacturers to include every weird interface device that people in universities come up with. But lots of people carry around these private digital devices like a phone. And we can install whatever the hell we want on that unless we follow Apple's rules. And we wanna make the interaction
47:20
less physically situated. And the private device does this too because we can authenticate to the device wherever the hell we want. And then we can use the device to authenticate to the terminal. So it moves the problem from one of authentication to one of communication. But there are still some constraints on this. We don't know in advance what terminals we're gonna use.
47:40
So we can't pre-pair. You can't pair your phone in advance to every terminal you might possibly wanna use in the future. And we don't wanna use something that radiates information in all directions and has the risk of a man in the middle attack. And finally, it's gotta be fast and easy or people won't use it and it's gotta be cheap or manufacturers won't use it.
48:01
So here's a graphic of the interaction. You authenticate privately. You use your private device with physical proximity to communicate an encrypted credential to the terminal. From the terminal's point of view, it looks like piece four. It's just like you entered your PN right at the terminal. So here's a prototype of a system that performs this communication using light.
48:29
You enter the password by whatever means necessary on the phone and then place it on the receiver where the thing is transmitted with light. And you can see a lot of flashing leaking out from that.
48:40
That's because there are specifically LEDs in there to introduce visual chaff so that to prevent any recording and replay attack. We don't have a user study for this yet. It's been done but it's under submission to a journal. So we didn't want to pre-release it here
49:03
but suffice it to say that users were happy with it. Here's another graphic of how it works. And the important thing to note with this is that the password is not transmitted in the clear. So even though there's some observation resistant stuff with those spoofing LEDs, it's salted and hashed. So it's of less use to an attacker
49:21
than a clear transmitted password. And the hardware here, which is very, very simple, you know, a microcontroller, some LEDs and a light sensor very, very cheap and reliable. Less than 1% error rate. The next version uses the color screen so that more data can be encoded
49:41
within the same transmission time. So it can be a longer hash by still being usable. Andrea also did a version that looked into using a variable magnetic field because the field strength or the observability of the magnetic field falls off much, much faster than it does for light. So it's more difficult to observe.
50:02
But this method, any further work on this method is currently on hold because it's actually really similar to near field communications, which is gonna become commercially available probably in every phone very soon. Maybe even as soon as iPhone 5 this year. So no plans to do more work on this yet until we look into that and play around with that some.
50:23
So in conclusion, we're gonna have to live with passwords and PINs for a long time. We know that they fail in lots of ways and they suck in various ways, but they're not going away. We still need to authenticate on public terminals. We're not in this fully connected world where we can do everything on our private thing quite yet
50:43
but generally simple methods can result in security improvements in scenarios where there's a potential observation risk. There are things that we can do not to achieve perfect security. There's no such thing as a perfect defense but no matter who you are, if you're a manufacturer or an end user, it's not about defending against everything.
51:01
It's especially not about defending against everything for the service providers because they care a lot more about minimizing losses to themselves after the fact than they do about protecting your credentials. In particular, they don't give a shit about protecting your credentials used on other sites even though you may be reusing it for their site.
51:20
They just, there's nothing they can do about it. They're just gonna work on loss mitigation instead. So we wanna diversify the ecosystem of entry methods on our own bad, that's kind of the hacker spirit. Like don't worry about these guys, let's do it ourselves and do this mediated obfuscation of the data that we do have to enter.
51:43
So we showed some novel key entry systems for terminals and private devices and some software and hardware mediation systems for observation resistance when you do have to use these public terminals and I know, I hope that you guys are all thinking about potential attacks on these things
52:01
because that's how we do it. We take the armor to the bullet guys and say make a bullet that goes through this armor then we take the bullet, take the, you know what I'm saying. Armor to the bullet guys, just throw the armor. Bullet to the armor guys, make armor this doesn't go through.
52:20
That's how it works. But at least it forces attackers to work harder and maybe they'll go and bother someone else. Thanks.