Security and trust in open source security tokens

被引:0
|
作者
Schink M. [1 ]
Wagner A. [1 ]
Unterstein F. [1 ]
Heyszl J. [1 ]
机构
[1] Schink, Marc
[2] Wagner, Alexander
[3] Unterstein, Florian
[4] Heyszl, Johann
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
关键词
Fault injection attack; FIDO; Firmware protection; Second factor authentication; Security token; Side-channel attack;
D O I
10.46586/tches.v2021.i3.176-201
中图分类号
学科分类号
摘要
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight that there are new threats from attackers with physical access which need to be discussed. Supply chain adversaries may manipulate devices on a large scale and install backdoors before they even reach end users. In evil maid scenarios, specific devices may even be attacked while already in use. Hence, we thoroughly investigate the security and trustworthiness of seven commercially available open source security tokens, including devices from the two market leaders: SoloKeys and Nitrokey. Unfortunately, we identify and practically verify significant vulnerabilities in all seven examined tokens. Some of them are based on severe, previously undiscovered, vulnerabilities of two major microcontrollers which are used at a large scale in various products. Our findings clearly emphasize the significant threat from supply chain and evil maid scenarios since the attacks are practical and only require moderate attacker efforts. Fortunately, we are able to describe software-based countermeasures as effective improvements to retrofit the examined devices. To improve the security and trustworthiness of future security tokens, we also derive important general design recommendations. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:176 / 201
页数:25
相关论文
共 50 条
  • [1] Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
    Wermke, Dominik
    Woehler, Noah
    Klemmer, Jan H.
    Fourne, Marcel
    Acar, Yasemin
    Fahl, Sascha
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1880 - 1896
  • [2] Using web services to exchange security tokens for federated trust management
    Wu, Zhengping
    Weaver, Alfred C.
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 1176 - +
  • [3] On the security of open source software
    Payne, C
    INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [4] Is Open Source Security a Myth?
    Schryen, Guido
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 130 - +
  • [5] Signaling in the Market for Security Tokens
    Kreppmeier J.
    Laschinger R.
    Journal of Business Economics, 2023, 93 (9) : 1515 - 1552
  • [6] More Security, More Trust? Security Perceptions as a Source of Government Trust in Post-Conflict Settings
    Nomikos, William G.
    Stollenwerk, Eric
    JOURNAL OF INTERVENTION AND STATEBUILDING, 2024,
  • [7] Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild
    Trampert, Leon
    Stock, Ben
    Roth, Sebastian
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 714 - 726
  • [8] Security of Open Source Web Applications
    Walden, James
    Doyle, Maureen
    Welch, Grant A.
    Whelan, Michael
    ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 546 - 554
  • [9] Open source security: Opportunity or oxymoron?
    Lawton, G
    COMPUTER, 2002, 35 (03) : 18 - 21
  • [10] Increased security through open source
    Hoepman, Jaap-Henk
    Jacobs, Bart
    COMMUNICATIONS OF THE ACM, 2007, 50 (01) : 79 - 83