Title :
On the Security of Trustee-Based Social Authentications
Author :
Gong, Neil Zhenqiang ; Di Wang
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Univ. of California at Berkeley, Berkeley, CA, USA
Abstract :
Recently, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user´s friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user´s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password. In this paper, we provide the first systematic study about the security of trustee-based social authentications. In particular, we first introduce a novel framework of attacks, which we call forest fire attacks. In these attacks, an attacker initially obtains a small number of compromised users, and then the attacker iteratively attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to formalize the threats of forest fire attacks and their costs for attackers. Moreover, we introduce various defense strategies. Finally, we apply our framework to extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. Our results have strong implications for the design of more secure trustee-based social authentications.
Keywords :
security of data; authenticating users; backup authentication mechanism; concrete attack; defense strategies; forest fire attacks; probabilistic model; real-world social network datasets; secure trustee-based social authentications; verification codes; Aggregates; Authentication; Computational modeling; Facebook; Ignition; Social authentication; backup authentication; security model;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2014.2330311