首页> 外文OA文献 >Towards Trusted Execution of Multi-modal Continuous Authentication Schemes
【2h】

Towards Trusted Execution of Multi-modal Continuous Authentication Schemes

机译:迈向多模式连续认证方案的可信执行

摘要

The emergence of powerful, sensor-rich devices has spawned the development of continuous authentication (CA) schemes on commodity hardware, where user behaviour is compared to past experience to produce an authentication decision, with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in real-world deployments, namely the ubiquity of malware and arbitrary software attacks. This has particular importance when a device cannot be trusted by a third-party, e.g. a corporation, that controls access to assets based on CA decisions. A software compromise, either on the platform or scheme implementation, may enable the modification of authentication scores, gain insights into user behavioural patterns, or gain unauthorised access to restricted assets. For the first time, we examine two standardised constructs that offer isolated and trusted execution -- Secure Elements (SEs) and Trusted Execution Environments (TEEs) -- even when an adversary has root-level privileges for protecting CA schemes while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX -- providing confidentiality, integrity and trust assurances over untrusted world implementations. We present an evaluation of TEE- and non-TEE performance using methods proposed in related work. The results indicate that trusted CA can be performed in an efficient fashion while removing the main platform from the TCB.
机译:功能强大,传感器丰富的设备的出现催生了商品硬件上连续认证(CA)方案的发展,该方案将用户行为与过去的经验进行比较,以制定认证决策,目的是解决传统认证方案的挑战。但是,当前的CA提议在很大程度上没有考虑到实际部署中存在的对手,即无处不在的恶意软件和任意软件攻击。当设备不能被第三方信任时,这尤其重要。一家根据CA决策控制对资产访问的公司。在平台或方案实现上进行的软件折衷可以启用身份验证分数的修改,深入了解用户的行为模式或获得对受限资产的未授权访问。我们首次审查了两个提供隔离且受信任的执行的标准化结构-安全元素(SE)和受信任的执行环境(TEE)-即使对手具有保护CA方案同时保留可部署性的根级特权。基于这些,我们实现了第一个使用英特尔SGX在消费者移动设备上评估基于TEE的CA的系统-通过不受信任的全球实现提供机密性,完整性和信任保证。我们使用相关工作中提出的方法对TEE和非TEE性能进行评估。结果表明,可以在从TCB中删除主要平台的同时,以有效的方式执行受信任的CA。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号