首页> 外文期刊>Mobile Computing, IEEE Transactions on >Keylogging-Resistant Visual Authentication Protocols
【24h】

Keylogging-Resistant Visual Authentication Protocols

机译:防按键记录的视觉验证协议

获取原文
获取原文并翻译 | 示例
           

摘要

The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers (PCs) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.
机译:考虑到个人计算机(PC)中存在各种根套件,以观察用户的行为并使PC成为不受信任的设备,因此安全身份验证协议的设计非常具有挑战性。让人类参与身份验证协议虽然很有希望,但由于其有限的计算和存储能力而并非易事。因此,依靠用户来增强安全性必然会降低可用性。另一方面,放宽假设和严格的安全设计以改善用户体验可能会导致违反安全性的行为,从而损害用户的信任。在本文中,我们演示了精心的可视化设计如何不仅可以增强安全性,而且可以增强身份验证的可用性。为此,我们提出了两种视觉认证协议:一种是一次性密码协议,另一种是基于密码的认证协议。通过严格的分析,我们验证了我们的协议不受文献中适用的许多挑战性身份验证攻击的影响。此外,通过对协议原型进行广泛的案例研究,我们强调了我们的方法在现实世界中部署的潜力:我们能够在满足严格的安全性要求的同时实现高可用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号