Towards trusted execution of multi-modal continuous authentication schemes

Carlton Shepherd, Raja Akram, Konstantinos Markantonakis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

The emergence of powerful, sensor-rich devices has spawned the development of continuous authentication (CA) schemes on commodity hardware, where user behaviour is compared to past experience to produce an authentication decision, with the aim of addressing challenges with traditional authentication schemes. Current CA proposals, however, have largely neglected adversaries present in real-world deployments, namely the ubiquity of malware and arbitrary software attacks. This has particular importance when a device cannot be trusted by a third-party, e.g. a corporation, that controls access to assets based on CA decisions. A software compromise, either on the platform or scheme implementation, may enable the modification of authentication scores, gain insights into user behavioural patterns, or gain unauthorised access to restricted assets. For the first time, we examine two standardised constructs that offer isolated and trusted execution -- Secure Elements (SEs) and Trusted Execution Environments (TEEs) -- even when an adversary has root-level privileges for protecting CA schemes while retaining deployability. Based on these, we implement the first system for evaluating TEE-based CA on a consumer mobile device using Intel SGX -- providing confidentiality, integrity and trust assurances over untrusted world implementations. We present an evaluation of TEE- and non-TEE performance using methods proposed in related work. The results indicate that trusted CA can be performed in an efficient fashion while removing the main platform from the TCB.
Original languageEnglish
Title of host publicationSAC '17: Proceedings of the Symposium on Applied Computing
Place of PublicationMarrakech, Morocco
PublisherACM
Pages1444-1451
Number of pages8
ISBN (Print)978-1-4503-4486-9
DOIs
Publication statusPublished - 3 Apr 2017
EventThe 32nd ACM Symposium on Applied Computing - Marrakech, Marrakech, Morocco
Duration: 3 Apr 20177 Apr 2017

Conference

ConferenceThe 32nd ACM Symposium on Applied Computing
Country/TerritoryMorocco
CityMarrakech
Period3/04/177/04/17

Keywords

  • Authentication
  • Trusted Execution Environments
  • Trusted Computing
  • Mobile Security

Fingerprint

Dive into the research topics of 'Towards trusted execution of multi-modal continuous authentication schemes'. Together they form a unique fingerprint.

Cite this