skip to main content
10.1145/1866886.1866895acmconferencesArticle/Chapter ViewAbstractPublication Pagesinsider-threatsConference Proceedingsconference-collections
research-article

Duress detection for authentication attacks against multiple administrators

Published:08 October 2010Publication History

ABSTRACT

An authentication system is duress-resistant if it allows a user or system administrator to covertly send a silent alarm during the login process, indicating that they are being forced to authenticate against their will. The adversary knows that the system has this feature, e.g., if two passwords are used (one normal and one duress) then the adversary will demand from a victim both passwords. We require that the adversary is not able to distinguish a non-cooperating victim from a cooperating victim, even if there are multiple victims some of whom cooperate while others do not. To avoid a false alarm, we also require that the probability of a user accidentally sending a duress signal (e.g., through typos) is small. After arguing that existing techniques are inadequate for such requirements, we present our design and implementation of a duress-resistant authentication system that can be used by any number of administrators and users. Our system is compatible with existing authentication systems, and can be implemented as an augmentation of their capabilities that does not require modification of their internals.

References

  1. }}Clark, Jeremy and Hengartner, Urs. Panic passwords: authenticating under duress. In Proceedings of the 3rd Conference on Hot Topics in Security (2008), USENIX Association, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}Russikoff, Ronald K. Computerized password verification system and method for ATM transactions. United States Patent, 6871288, March 22, 2005.Google ScholarGoogle Scholar
  3. }}Leemon C. Baird, et al. Apparatus and method for authenticating access to a network resource. United States Patent, 6732278, May 4, 2004.Google ScholarGoogle Scholar
  4. }}Michael Wayne Brown, Rabindranath Dutta, Michael A. Paolini, Newton James Smith, Jr. Cash register and method of accounting for cash transactions. United States Patent, 6550671, April 22, 2003.Google ScholarGoogle Scholar
  5. }}RESEARCH IN MOTION. Duress Notification Address IT policy rule. Retreived July 2, 2009 from BlackBerry Enterprise Solution Security - Policy Reference Guide: http://na.blackberry.com/eng/deliverables/4222/Duress_Notification_Address_204132_11.jsp.Google ScholarGoogle Scholar
  6. }}SPRINT. WebID Authentication with a SecurID PINPAD. Retreived July 2, 2009 from: http://cagate.sprint.com/documentation/securid/documents/SecurID_Pinpad_Token.pdf.Google ScholarGoogle Scholar
  7. }}ALMEX LTD. Bioscrypt Fingerprint readers for door access sold by Almex. Retreived July 2, 2009 from: http://www.almexltd.com/fingerprint-readers.htm.Google ScholarGoogle Scholar
  8. }}Howie, John. Authentication Options. Windows IT Pro (July 2006).Google ScholarGoogle Scholar
  9. }}Weinshall, Daphna and Kirkpatrick, Scott. Passwords youll never forget, but cant recall. In Conference on Human Factors in Computing Systems (2004), ACM, 1399--1402. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Duress detection for authentication attacks against multiple administrators

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Insider Threats '10: Proceedings of the 2010 ACM workshop on Insider threats
        October 2010
        70 pages
        ISBN:9781450300926
        DOI:10.1145/1866886
        • General Chair:
        • Ehab Al-Shaer,
        • Program Chairs:
        • Brent Lagesse,
        • Craig Shue

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Insider Threats '10 Paper Acceptance Rate7of14submissions,50%Overall Acceptance Rate7of14submissions,50%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader