skip to main content
10.1145/2714576.2714614acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

TrustLogin: Securing Password-Login on Commodity Operating Systems

Published:14 April 2015Publication History

ABSTRACT

With the increasing prevalence of Web 2.0 and cloud computing, password-based logins play an increasingly important role on user-end systems. We use passwords to authenticate ourselves to countless applications and services. However, login credentials can be easily stolen by attackers. In this paper, we present a framework, TrustLogin, to secure password-based logins on commodity operating systems. TrustLogin leverages System Management Mode to protect the login credentials from malware even when OS is compromised. TrustLogin does not modify any system software in either client or server and is transparent to users, applications, and servers. We conduct two study cases of the framework on legacy and secure applications, and the experimental results demonstrate that TrustLogin is able to protect login credentials from real-world keyloggers on Windows and Linux platforms. TrustLogin is robust against spoofing attacks. Moreover, the experimental results also show TrustLogin introduces a low overhead with the tested applications.

References

  1. C-Scale Frequency Reference Guide for Musicians. http://www.ronelmm.com/tones/cscale.html.Google ScholarGoogle Scholar
  2. Common Vulnerabilities and Exposures list. http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/cvssscoremin-7/cvssscoremax-7.99/Linux-Linux-Kernel.html. Access time: 07/06/2014.Google ScholarGoogle Scholar
  3. Credit Card Data Breach at Barnes & Noble Stores. http://www.nytimes.com/2012/10/24/business/hackers-get-credit-data-at-barnes-noble.html_r=3&.Google ScholarGoogle Scholar
  4. Free Keylogger Pro. http://freekeyloggerpro.com/.Google ScholarGoogle Scholar
  5. Intel 64 and IA-32 Architectures Optimization Reference Manual. http://www.intel.com/content/www/us/en/architecture-and-technology/64-ia-32-architectures-optimization-manual.html.Google ScholarGoogle Scholar
  6. Keyboard Scan Code Set 1. http://www.computer-engineering.org/ps2keyboard/scancodes1.html.Google ScholarGoogle Scholar
  7. Keylogger Malware Found on UC Irvine Health Center Computers. http://www.scmagazine.com/keylogger-malware-found-on-three-uc-irvine-health-center-computers/article/347204/.Google ScholarGoogle Scholar
  8. Keylogger Products. http://www.keylogger.org.Google ScholarGoogle Scholar
  9. Logkeys Linux keylogger. https://code.google.com/p/logkeys/.Google ScholarGoogle Scholar
  10. NSA's ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware. http://Leaksource.wordpress.com.Google ScholarGoogle Scholar
  11. OpenSSH. http://www.openssh.com. Access time: 09/01/2014.Google ScholarGoogle Scholar
  12. Advanced Micro Devices, Inc. BIOS and Kernel Developer's Guide for AMD Athlon 64 and AMD Opteron Processors. http://support.amd.com/TechDocs/26094.PDF.Google ScholarGoogle Scholar
  13. A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: Enabling Stealthy In-Context Measurement of Hypervisor Integrity. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. M. Azab, P. Ning, and X. Zhang. SICE: A Hardware-level Strongly Isolated Computing Environment for x86 Multi-core Platforms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Borders and A. Prakash. Securing network input via a trusted input proxy. In Proceedings of the 2nd USENIX workshop on Hot topics in security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Bulygin, J. Loucaides, A. Furtak, O. Bazhaniuk, and A. Matrosov. Summary of Attacks Against BIOS and Secure Boot. In Defcon-22, 2014.Google ScholarGoogle Scholar
  17. J. Butterworth, C. Kallenberg, and X. Kovah. BIOS Chronomancy: Fixing the Core Root of Trust for Measurement. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS'13), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Collignon. In-memory Extraction of SSL Private Keys. http://c0decstuff.blogspot.com/2011/01/in-memory-extraction-of-ssl-private.html, 2011.Google ScholarGoogle Scholar
  19. Coreboot. Open-Source BIOS. http://www.coreboot.org/.Google ScholarGoogle Scholar
  20. S. Embleton, S. Sparks, and C. Zou. SMM rootkits: A New Breed of OS Independent Malware. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm'08), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. Fu and Z. Lin. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P'12), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Holz, M. Engelberth, and F. Freiling. Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. In Proceedings of The 14th European Symposium on Research in Computer Security (ESORICS'09), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Intel. Enhanced Host Controller Interface Specification for Universal Serial Bus. http://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/ehci-specification-for-usb.pdf.Google ScholarGoogle Scholar
  24. Intel. eXtensible Host Controller Interface for Universal Serial Bus (xHCI). http://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/extensible-host-controler-interface-usb-xhci.pdf.Google ScholarGoogle Scholar
  25. Intel. PCI/PCI-X GbE Family of Controllers: Software Developer Manual. http://www.intel.com/content/www/us/en/ethernet-controllers/pci-pci-x-family-gbe-controllers-software-dev-manual.html.Google ScholarGoogle Scholar
  26. Intel. Universal Host Controller Interface (UHCI) Design Guide. ftp.netbsd.org/pub/NetBSD/misc/blymn/uhci11d.pdf.Google ScholarGoogle Scholar
  27. B. Jain, M. B. Baig, D. Zhang, D. E. Porter, and R. Sion. SoK: Introspections on Trust and the Semantic Gap. In Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-based Out-of-the-box Semantic View Reconstruction. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. E. Ladakis, L. Koromilas, G. Vasiliadis, M. Polychronakis, and S. Ioannidis. You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger. In Proceedings of the European Workshop on System Security (EuroSec'13) 2013.Google ScholarGoogle Scholar
  30. T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P'11), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Mannan and P. van Oorschot. Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers. Journal of Computer Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica. Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC'12), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS, 2009.Google ScholarGoogle Scholar
  35. Ohloh. Black Duck Software, Inc. http://www.ohloh.net. Access time: 7/16/2014.Google ScholarGoogle Scholar
  36. A. Reina, A. Fattori, F. Pagani, L. Cavallaro, and D. Bruschi. When Hardware Meets Software: A Bulletproof Solution to Forensic Memory Acquisition. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'12), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Sagiroglu and G. Canbek. Keyloggers. Technology and Society Magazine, IEEE, 2009.Google ScholarGoogle Scholar
  38. J. Schiffman and D. Kaplan. The SMM Rootkit Revisited: Fun with USB. In Proceedings of 9th International Conference on Availability, Reliability and Security (ARES'14), 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. H.-M. Sun, Y.-H. Chen, and Y.-H. Lin. oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. Information Forensics and Security, IEEE Transactions on, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. K. Sun, J. Wang, F. Zhang, and A. Stavrou. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS'12), 2012.Google ScholarGoogle Scholar
  41. A. Vasudevan, B. Parno, N. Qu, V. Gligor, and A. Perrig. Lockdown: A Safe and Practical Environment for Security Applications (Carnegie Mellon University-CyLab-09-011). Technical report, 2009.Google ScholarGoogle Scholar
  42. VIA. VT8237R Southbridge. http://www.via.com.tw/.Google ScholarGoogle Scholar
  43. F. Wecherowski. A Real SMM Rootkit: Reversing and Hooking BIOS SMI Handlers. Phrack Magazine, 2009.Google ScholarGoogle Scholar
  44. H. William, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes: The Art of Scientific Computing. Cambridge University Press, New York, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. R. Wojtczuk and C. Kallenberg. Attacking UEFI Boot Script. http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2566/original/venamis_whitepaper.pdf, 2014.Google ScholarGoogle Scholar
  46. R. Wojtczuk and J. Rutkowska. Attacking SMM Memory via Intel CPU Cache Poisoning, 2009.Google ScholarGoogle Scholar
  47. F. Zhang, K. Leach, K. Sun, and A. Stavrou. SPECTRE: A Dependable Introspection Framework via System Management Mode. In Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'13), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. F. Zhang, H. Wang, K. Leach, and A. Stavrou. A Framework to Secure Peripherals at Runtime. In Proceedings of The 19th European Symposium on Research in Computer Security (ESORICS'14), 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. F. Zhang, J. Wang, K. Sun, and A. Stavrou. HyperCheck: A Hardware-assisted Integrity Monitor. In IEEE Transactions on Dependable and Secure Computing (TDSC'14), 2014.Google ScholarGoogle Scholar

Index Terms

  1. TrustLogin: Securing Password-Login on Commodity Operating Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
          April 2015
          698 pages
          ISBN:9781450332453
          DOI:10.1145/2714576

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 April 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ASIA CCS '15 Paper Acceptance Rate48of269submissions,18%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader