Security and trust in open source security tokens

被引:0
|
作者
Schink M. [1 ]
Wagner A. [1 ]
Unterstein F. [1 ]
Heyszl J. [1 ]
机构
[1] Schink, Marc
[2] Wagner, Alexander
[3] Unterstein, Florian
[4] Heyszl, Johann
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
关键词
Fault injection attack; FIDO; Firmware protection; Second factor authentication; Security token; Side-channel attack;
D O I
10.46586/tches.v2021.i3.176-201
中图分类号
学科分类号
摘要
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most password-related security issues and improve security indisputably. However, we would like to highlight that there are new threats from attackers with physical access which need to be discussed. Supply chain adversaries may manipulate devices on a large scale and install backdoors before they even reach end users. In evil maid scenarios, specific devices may even be attacked while already in use. Hence, we thoroughly investigate the security and trustworthiness of seven commercially available open source security tokens, including devices from the two market leaders: SoloKeys and Nitrokey. Unfortunately, we identify and practically verify significant vulnerabilities in all seven examined tokens. Some of them are based on severe, previously undiscovered, vulnerabilities of two major microcontrollers which are used at a large scale in various products. Our findings clearly emphasize the significant threat from supply chain and evil maid scenarios since the attacks are practical and only require moderate attacker efforts. Fortunately, we are able to describe software-based countermeasures as effective improvements to retrofit the examined devices. To improve the security and trustworthiness of future security tokens, we also derive important general design recommendations. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:176 / 201
页数:25
相关论文
共 50 条
  • [41] Smartcards - From security tokens to intelligent adjuncts
    Balacheff, B
    Van Wilder, B
    Chan, D
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 71 - 84
  • [42] Security Evaluation Criteria of Open-Source Libraries
    Mills, Vivian
    Butakov, Sergey
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART V, 2022, 13381 : 422 - 435
  • [43] An Open-Source Cloud Testbed for Security Experimentation
    Minna, Francesco
    Massacci, Fabio
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 756 - 759
  • [44] Recent and noteworthy open source transportation security developments
    Thomas, Andrew R.
    JOURNAL OF TRANSPORTATION SECURITY, 2008, 1 (01) : 67 - 70
  • [45] Top open-source security tools for Unix
    Gaur, Nalneesh
    Unix Review, 1999, 17 (08):
  • [46] Open-Source OPC UA Security and Scalability
    Muehlbauer, Nikolas
    Kirdan, Erkin
    Pahl, Marc-Oliver
    Carle, Georg
    2020 25TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2020, : 262 - 269
  • [47] VoIP Security regarding the Open Source Software Asterisk
    Detken, Kai-Oliver
    Eren, Evren
    IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL I, PROCEEDINGS, 2008, : 93 - +
  • [48] FISMOS - An FPGA Implementation of a Security Module as Open Source
    Schubaur, Philipp
    Knauer, Peter
    Merli, Dominik
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [49] Security in Open Source Web Content Management Systems
    Meike, Michael
    Sametinger, Johannes
    Wiesauer, Andreas
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 44 - 51
  • [50] Industry-Wide Analysis of Open Source Security
    Zhang, Yiming
    Malhotra, Baljeet
    Chen, Cheng
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 227 - 236