首页> 外文OA文献 >Using Trusted Execution Environments in Two-factor Authentication: comparing approaches
【2h】

Using Trusted Execution Environments in Two-factor Authentication: comparing approaches

机译:在双因素身份验证中使用可信执行环境:比较方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environ- ment). A reason for this success are the strong security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physi- cally separate device. This paper investigates whether Trusted Execution Environments (TEE) can be used to achieve a comparable level of security without the need to have a separate device. To do this, we introduce a model that shows the security properties of user interaction in two-factor authentication. The model is used to examine two TEE technologies, Intel’s IPT and ARM TrustZone, revealing that, although it is possible to get close to classic two-factor authentication in terms of user interaction security, both technologies have distinct drawbacks. The model also clearly shows an open problem shared by many TEEs: how to prove to the user that they are dealing with a trusted application when trusted and untrusted applications share the same display.
机译:经典的双重身份验证已经存在了很长时间,并且在某些市场(例如公司和银行环境)中获得了成功。取得成功的原因是强大的安全性,尤其是在涉及用户交互时。这些属性取决于作为物理上独立设备的安全令牌。本文研究了是否可以使用受信任的执行环境(TEE)来达到可比的安全级别,而无需使用单独的设备。为此,我们引入了一个模型,该模型显示了两因素身份验证中用户交互的安全属性。该模型用于检查两种TEE技术,即Intel的IPT和ARM TrustZone,它表明,尽管在用户交互安全性方面可以接近经典的两因素身份验证,但这两种技术都有明显的缺点。该模型还清楚地显示了许多TEE共同存在的一个开放性问题:当受信任和不受信任的应用程序共享同一显示时,如何向用户证明他们正在处理受信任的应用程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号