Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Christodorescu, Mihai, Shirvanian, Maliheh, Zawoad, Shams
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Christodorescu, Mihai
Shirvanian, Maliheh
Zawoad, Shams
description Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve such issues, we propose an application authentication, where we rely on unique and distinguishable application's behavior to lock the key during a setup phase and unlock it for authentication. Our system add a fuzzy-extractor layer on top of current credential authentication systems. During a key enrollment process, the application's behavioral data collected from various sensors in the network are used to hide the credential key. The fuzzy extractor releases the key to the server if the application's behavior during the authentication matches the one collected during the enrollment, with some noise tolerance. We designed the system, analyzed its security, and implemented and evaluated it using 10 real-life applications deployed in our network. Our security analysis shows that the system is secure against client compromise, vault compromise, and feature observation. The evaluation shows the scheme can achieve 0 percent False Accept Rate with an average False Rejection Rate 14 percent and takes about 51 ms to successfully authenticate a client. In light of these promising results, we expect our system to be of practical use, since its deployment requires zero to minimal changes on the server.
doi_str_mv 10.48550/arxiv.2211.13195
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2211_13195</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2211_13195</sourcerecordid><originalsourceid>FETCH-LOGICAL-a675-dacf903984a53af327a27253e844a1b915bfa8a9fe4e5afc5b72debbbe5f36ba3</originalsourceid><addsrcrecordid>eNpNj0tLw0AUhWfjQqo_wJX5AxMzj9tklrE-oWCRdlcId6Z37EDzYJIG8--1VcHV4eMcDnyM3Ygs1QVAdofxM4yplEKkQgkDl2y7imFEN_FVpJ7iGJqPpOy6Q3A4hLbhQ8v_YVIehz01wx9u-tP-YWqwDi55P343NSX3tMcxtLG_YhceDz1d_-aMrZ8e14sXvnx7fl2US47zHPgOnTeZMoVGUOiVzFHmEhQVWqOwRoD1WKDxpAnQO7C53JG1lsCruUU1Y7c_t2e9qouhxjhVJ83qrKm-AHizUEs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors</title><source>arXiv.org</source><creator>Christodorescu, Mihai ; Shirvanian, Maliheh ; Zawoad, Shams</creator><creatorcontrib>Christodorescu, Mihai ; Shirvanian, Maliheh ; Zawoad, Shams</creatorcontrib><description>Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve such issues, we propose an application authentication, where we rely on unique and distinguishable application's behavior to lock the key during a setup phase and unlock it for authentication. Our system add a fuzzy-extractor layer on top of current credential authentication systems. During a key enrollment process, the application's behavioral data collected from various sensors in the network are used to hide the credential key. The fuzzy extractor releases the key to the server if the application's behavior during the authentication matches the one collected during the enrollment, with some noise tolerance. We designed the system, analyzed its security, and implemented and evaluated it using 10 real-life applications deployed in our network. Our security analysis shows that the system is secure against client compromise, vault compromise, and feature observation. The evaluation shows the scheme can achieve 0 percent False Accept Rate with an average False Rejection Rate 14 percent and takes about 51 ms to successfully authenticate a client. In light of these promising results, we expect our system to be of practical use, since its deployment requires zero to minimal changes on the server.</description><identifier>DOI: 10.48550/arxiv.2211.13195</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2022-11</creationdate><rights>http://creativecommons.org/licenses/by-nc-sa/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2211.13195$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2211.13195$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Christodorescu, Mihai</creatorcontrib><creatorcontrib>Shirvanian, Maliheh</creatorcontrib><creatorcontrib>Zawoad, Shams</creatorcontrib><title>Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors</title><description>Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve such issues, we propose an application authentication, where we rely on unique and distinguishable application's behavior to lock the key during a setup phase and unlock it for authentication. Our system add a fuzzy-extractor layer on top of current credential authentication systems. During a key enrollment process, the application's behavioral data collected from various sensors in the network are used to hide the credential key. The fuzzy extractor releases the key to the server if the application's behavior during the authentication matches the one collected during the enrollment, with some noise tolerance. We designed the system, analyzed its security, and implemented and evaluated it using 10 real-life applications deployed in our network. Our security analysis shows that the system is secure against client compromise, vault compromise, and feature observation. The evaluation shows the scheme can achieve 0 percent False Accept Rate with an average False Rejection Rate 14 percent and takes about 51 ms to successfully authenticate a client. In light of these promising results, we expect our system to be of practical use, since its deployment requires zero to minimal changes on the server.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNpNj0tLw0AUhWfjQqo_wJX5AxMzj9tklrE-oWCRdlcId6Z37EDzYJIG8--1VcHV4eMcDnyM3Ygs1QVAdofxM4yplEKkQgkDl2y7imFEN_FVpJ7iGJqPpOy6Q3A4hLbhQ8v_YVIehz01wx9u-tP-YWqwDi55P343NSX3tMcxtLG_YhceDz1d_-aMrZ8e14sXvnx7fl2US47zHPgOnTeZMoVGUOiVzFHmEhQVWqOwRoD1WKDxpAnQO7C53JG1lsCruUU1Y7c_t2e9qouhxjhVJ83qrKm-AHizUEs</recordid><startdate>20221123</startdate><enddate>20221123</enddate><creator>Christodorescu, Mihai</creator><creator>Shirvanian, Maliheh</creator><creator>Zawoad, Shams</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20221123</creationdate><title>Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors</title><author>Christodorescu, Mihai ; Shirvanian, Maliheh ; Zawoad, Shams</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a675-dacf903984a53af327a27253e844a1b915bfa8a9fe4e5afc5b72debbbe5f36ba3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Christodorescu, Mihai</creatorcontrib><creatorcontrib>Shirvanian, Maliheh</creatorcontrib><creatorcontrib>Zawoad, Shams</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Christodorescu, Mihai</au><au>Shirvanian, Maliheh</au><au>Zawoad, Shams</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors</atitle><date>2022-11-23</date><risdate>2022</risdate><abstract>Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve such issues, we propose an application authentication, where we rely on unique and distinguishable application's behavior to lock the key during a setup phase and unlock it for authentication. Our system add a fuzzy-extractor layer on top of current credential authentication systems. During a key enrollment process, the application's behavioral data collected from various sensors in the network are used to hide the credential key. The fuzzy extractor releases the key to the server if the application's behavior during the authentication matches the one collected during the enrollment, with some noise tolerance. We designed the system, analyzed its security, and implemented and evaluated it using 10 real-life applications deployed in our network. Our security analysis shows that the system is secure against client compromise, vault compromise, and feature observation. The evaluation shows the scheme can achieve 0 percent False Accept Rate with an average False Rejection Rate 14 percent and takes about 51 ms to successfully authenticate a client. In light of these promising results, we expect our system to be of practical use, since its deployment requires zero to minimal changes on the server.</abstract><doi>10.48550/arxiv.2211.13195</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2211.13195
ispartof
issn
language eng
recordid cdi_arxiv_primary_2211_13195
source arXiv.org
subjects Computer Science - Cryptography and Security
title Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T01%3A29%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy-Preserving%20Application-to-Application%20Authentication%20Using%20Dynamic%20Runtime%20Behaviors&rft.au=Christodorescu,%20Mihai&rft.date=2022-11-23&rft_id=info:doi/10.48550/arxiv.2211.13195&rft_dat=%3Carxiv_GOX%3E2211_13195%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true