Security and trust in open source security tokens

被引:0
|
作者
Schink M. [1 ]
Wagner A. [1 ]
Unterstein F. [1 ]
Heyszl J. [1 ]
机构
[1] Schink, Marc
[2] Wagner, Alexander
[3] Unterstein, Florian
[4] Heyszl, Johann
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
关键词
Fault injection attack; FIDO; Firmware protection; Second factor authentication; Security token; Side-channel attack;
D O I
10.46586/tches.v2021.i3.176-201
中图分类号
学科分类号
摘要
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight that there are new threats from attackers with physical access which need to be discussed. Supply chain adversaries may manipulate devices on a large scale and install backdoors before they even reach end users. In evil maid scenarios, specific devices may even be attacked while already in use. Hence, we thoroughly investigate the security and trustworthiness of seven commercially available open source security tokens, including devices from the two market leaders: SoloKeys and Nitrokey. Unfortunately, we identify and practically verify significant vulnerabilities in all seven examined tokens. Some of them are based on severe, previously undiscovered, vulnerabilities of two major microcontrollers which are used at a large scale in various products. Our findings clearly emphasize the significant threat from supply chain and evil maid scenarios since the attacks are practical and only require moderate attacker efforts. Fortunately, we are able to describe software-based countermeasures as effective improvements to retrofit the examined devices. To improve the security and trustworthiness of future security tokens, we also derive important general design recommendations. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:176 / 201
页数:25
相关论文
共 50 条
  • [31] A security evaluation and testing methodology for open source software embedded information security system
    Choi, SJ
    Kang, YH
    Lee, GS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 215 - 224
  • [32] Security and Trust in Blockchains: Architecture, Key Technologies, and Open Issues
    Zhang, Peiyun
    Zhou, Mengchu
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (03): : 790 - 801
  • [33] Security and Trust in Open and Disaggregated 6G networks
    Alemany, P.
    Munoz, R.
    Vilalta, R.
    Gifre, Ll
    Martinez, R.
    Casellas, R.
    Castro, M.
    Ferreira, P.
    Moreira, D.
    Garcia, J.
    Cunha, J.
    Nunez, I
    Gomez, G.
    Castro, S.
    Pastor, A.
    Lopez, D.
    2024 24TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, ICTON 2024, 2024,
  • [34] Enhancing Open RAN Security with Zero Trust and Machine Learning
    Moudoud, Hajar
    Cherkaoui, Soumaya
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2772 - 2777
  • [35] BioSec: Biometrics and security towards trust and security
    Sanchez, O
    EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 203 - 210
  • [36] TRUST BASED GRID SECURITY AND SECURITY MODELS
    Kavecky, Slavomir
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 81 - 92
  • [37] Open Hearts, Open Minds: Trust, Confidence and Security Building in Northeast Asia
    Miall, Hugh
    Shibata, Ria
    JOURNAL FOR PEACE AND NUCLEAR DISARMAMENT, 2020, 3 (02) : 366 - 384
  • [38] THE INTERSECTION OF SPORTS, SECURITY, AND CRYPTO FAN TOKENS
    Marinov, Georgi
    Kuleva, Milena
    STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION-STRATEGII NA OBRAZOVATELNATA I NAUCHNATA POLITIKA, 2023, 31 (05): : 62 - 72
  • [39] On the Usability of Authenticity Checks for Hardware Security Tokens
    Pfeffer, Katharina
    Mai, Alexandra
    Ski, Adrian Dabrow
    Gusenbauer, Matthias
    Schindler, Philipp
    Weippl, Edgar
    Franz, Michael
    Krombholz, Katharina
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 37 - 54
  • [40] Threat modelling for security tokens in web applications
    De Cock, D
    Wouters, K
    Schellekens, D
    Singelee, D
    Preneel, B
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 183 - 193