• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research Projects
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News Archive

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

ZEBRA Attack

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.

Deauthentication is an important component of any authentication system. The widespread use of computing devices in daily life has underscored the need for zero-effort deauthentication schemes. However, the quest for eliminating user effort may lead to hidden security flaws in the authentication schemes.
As a case in point, we investigate a prominent zero-effort bilateral deauthentication scheme called ZEBRA, which provides an interesting and a useful solution to a difficult problem as demonstrated in the original paper. ZEBRA is intended for scenarios where users authenticate to “terminals” (such as desktop computers). In such scenarios, users typically have to either manually deauthenticate themselves by logging out or locking the terminal, or the terminal can deauthenticate a user automatically after a sufficiently long period of inactivity. The former requires user effort while the latter sacrifices promptness. ZEBRA attempts to make the process of deauthentication both prompt and transparent: once a user is authenticated to a terminal (using say a password), it continuously, yet transparently re-authenticates the user so that prompt deauthentication is possible without explicit user action. A user is required to wear a bracelet equipped with sensors on his mouse holding hand. The bracelet is wirelessly connected to the terminal, which compares the sequence of events it observes (e.g., keyboard/mouse interactions) with the sequence of events inferred using measurements from the bracelet sensors. The logged-in user is deauthenticated when the two sequences no longer match.

benign

Figure1 : Normal operation of ZEBRA [Mare et al.; Oakland’14]

 
ZEBRA is particularly compelling because of its simplicity of design. However, the simplicity hides a design assumption that an adversary can exploit to defeat the scheme. We show how a more realistic adversary can circumvent ZEBRA. We identify a subtle incorrect assumption in its adversary model that leads to a fundamental design flaw. We exploit this to break the scheme with a class of attacks (Figure 2 shows the basic attack settings) that are much easier for a human to perform in a realistic adversary model, compared to the naive attacks studied in the ZEBRA paper. For example, one of our main attacks, where the human attacker has to opportunistically mimic only the victim’s keyboard typing activity at a nearby terminal, is significantly more successful compared to the naive attack that requires mimicking keyboard and mouse activities as well as keyboard-mouse movements. Further, by understanding the design flaws in ZEBRA as cases of tainted input, we show that we can draw on well-understood design principles to improve ZEBRA’s security.

attack-scenarios

Figure 2: Basic attack setting

 

People

Faculty

  • Nitesh Saxena

Student

  • Prakash Shrestha (PhD student)

External Collaborators:

  • Otto Huhta (PhD student; Aalto University; Now Master Expert at Nordea)
  • Swapnil Udar (MS student; Aalto University; Now Sr. Software Engineer at TomTom)
  • Mika Juuti (PhD student; Aalto University)
  • N. Asokan (Professor; Aalto University and the University of Helsinki)

Publications

  • Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
    Prakash Shrestha and Nitesh Saxena.
    In International Conference on Applied Cryptography and Network Security (ACNS), June  2022
  • Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
    Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena and N. Asokan.
    In the Network and Distributed System Security Symposium (NDSS), February 2016.
    [pdf]

Media Coverage

  • Is zero-effort computer security a dream? Breaking a new user verification system, UAB News, Feb 24, 2016
  • Is zero-effort computer security a dream? Breaking a new user verification system, Science Daily, Feb 24, 2016
  • Is Zero-Effort Computer Security a Dream? Breaking a New User Verification System, Newswise, Feb 24, 2016
  • Is zero-effort computer security a dream? Breaking a new user verification system, Tech Xplore, Feb 25, 2016
  • Is Zero-effort Computer Security a Dream? Breaking a New User Verification System, Scientific Computing, Feb 25, 2016
  • Is zero-effort computer security a dream? Breaking a new user verification system, Sci24H.com, Feb 25, 2016
  • Is zero-effort computer security a dream?, Help Net Security, Feb 26, 2016
  • Is zero-effort computer security a dream?, IT Security News, Feb 26, 2016
  • Is zero-effort computer security a dream?, Peerlyst, Feb 26, 2016
  • Is zero-effort computer security a dream?, The CyberSecurity Place, Feb 26, 2016
  • Is zero-effort computer security a dream?, SpiceWorks, Feb 26, 2016
  • Is zero-effort computer security a dream?, Threat Brief, Feb 26, 2016
  • Is zero-effort computer security a dream?, Webroot, Feb 27, 2016

Recent News

  • “Neuro Security” work got a MURI award from AFOSR March 22, 2023
  • Paper accepted to Oakland 2023 March 14, 2023
  • Paper (conditionally) accepted to MobiSys 2023 February 27, 2023
  • Paper accepted to USENIX Security 2023 February 21, 2023
  • 2 full papers accepted to WiSec 2023 January 30, 2023
  • Cybersecurity Program Led By Dr. Saxena Ranks Best! January 26, 2023
  • EarSpy in Media January 26, 2023
  • Dr. Saxena is a Co-PI on Thematic AI Lab November 28, 2022
  • Paper accepted to PMC 2022 November 28, 2022
  • Paper accepted to ICISC 2022 November 28, 2022
  • A New Grant from NSA October 17, 2022
  • Dr. Saxena appointed as a Dean’s Research Fellow October 17, 2022
  • Dr. Saxena to lead a new SaTC Medium project on Election Security July 16, 2022
  • SPIES Lab’s 12th PhD Graduate — Anuradha Mandal July 16, 2022
  • SPIES Lab’s 11th PhD Graduate – Payton Walker July 6, 2022
  • Two papers accepted to PST 2022 June 9, 2022
  • Paper accepted to ICDCS 2022 April 4, 2022
  • Paper accepted CHIL 2022 March 19, 2022
  • 2 papers accepted to WiSec 2022 March 19, 2022
  • Paper accepted to EuroS&P 2022 February 12, 2022

© 2016–2023 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment