首页> 外文会议>IEEE Symposium on Security and Privacy >An Extensive Formal Security Analysis of the OpenID Financial-Grade API
【24h】

An Extensive Formal Security Analysis of the OpenID Financial-Grade API

机译:对OpenID金融级API进行了广泛的正式安全分析

获取原文

摘要

Forced by regulations and industry demand, banks worldwide are working to open their customers' online banking accounts to third-party services via web-based APIs. By using these so-called Open Banking APIs, third-party companies, such as FinTechs, are able to read information about and initiate payments from their users' bank accounts. Such access to financial data and resources needs to meet particularly high security requirements to protect customers. One of the most promising standards in this segment is the OpenID Financial-grade API (FAPI), currently under development in an open process by the OpenID Foundation and backed by large industry partners. The FAPI is a profile of OAuth 2.0 designed for high-risk scenarios and aiming to be secure against very strong attackers. To achieve this level of security, the FAPI employs a range of mechanisms that have been developed to harden OAuth 2.0, such as Code and Token Binding (including mTLS and OAUTB), JWS Client Assertions, and Proof Key for Code Exchange. In this paper, we perform a rigorous, systematic formal analysis of the security of the FAPI, based on an existing comprehensive model of the web infrastructure - the Web Infrastructure Model (WIM) proposed by Fett, Küsters, and Schmitz. To this end, we first develop a precise model of the FAPI in the WIM, including different profiles for read-only and read-write access, different flows, different types of clients, and different combinations of security features, capturing the complex interactions in a web-based environment. We then use our model of the FAPI to precisely define central security properties. In an attempt to prove these properties, we uncover partly severe attacks, breaking authentication, authorization, and session integrity properties. We develop mitigations against these attacks and finally are able to formally prove the security of a fixed version of the FAPI. Although financial applications are high-stakes environments, this work is the first to formally analyze and, importantly, verify an Open Banking security profile. By itself, this analysis is an important contribution to the development of the FAPI since it helps to define exact security properties and attacker models, and to avoid severe security risks before the first implementations of the standard go live. Of independent interest, we also uncover weaknesses in the aforementioned security mechanisms for hardening OAuth 2.0. We illustrate that these mechanisms do not necessarily achieve the security properties they have been designed for.
机译:通过法规和行业需求强制,全球银行正在努力通过基于Web的API开设客户的网上银行账户。通过使用这些所谓的开放银行API,第三方公司(如Fintechs)能够阅读有关用户银行账户的信息并启动付款。这种访问财务数据和资源需要满足保护客户的特别高的安全要求。该分部中最有前途的标准之一是目前在OpenID基金会的开放过程中开发的OpenID金融级API(FAPI),并由大型工业伙伴支持。 FAPI是OAuth 2.0的简介,专为高风险场景而设计,旨在对非常强大的攻击者安全。为了实现这种级别的安全性,FAPI采用了一系列已开发的机制,该机制已开发为硬化OAuth 2.0,例如代码和令牌绑定(包括MTLS和OAUTB),JWS客户端断言和代码交换的证明密钥。在本文中,我们基于FETT,Küsters和Schmitz提出的网络基础设施模型(WIM)的现有综合模型,对FAPI的安全性进行严格的,系统正式分析FAPI的安全性。为此,我们首先在WIM中开发FAPI的精确模型,包括用于只读和读写访问,不同流量,不同类型的客户端以及安全特征的不同组合的不同配置文件,捕获复杂的交互基于Web的环境。然后我们使用我们的FAPI模型精确定义中央安全性。在尝试证明这些属性,我们发现部分严重的攻击,破坏身份验证,授权和会话完整性属性。我们开发对这些攻击的缓解,最后能够正式证明FAPI的固定版本的安全性。虽然财务应用是高赌注环境,但这项工作是第一个正式分析的,而且,重要的是,验证开放的银行安全配置文件。本身,这种分析是对FAPI开发的重要贡献,因为它有助于定义精确的安全性属性和攻击者模型,并在标准的第一个实现之前避免严重的安全风险。独立兴趣,我们还发现了上述安全机制中的弱点,以解决OAUTH 2.0。我们说明这些机制不一定能够实现它们所设计的安全性质。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号