G&D Mobile Becoming the solution partner of choice EMM

advertisement
Giesecke & Devrient
Presentation
OASIS – Identity Management Conference
DC, Sept 27th 2010
1
Giesecke & Devrient ―
From Printing Paper Securities to Providing High-Tech Solutions
Security
solutions
Government
solutions
Cards for payment and
telecommunications
Banknote
processing
Banknote and
security paper
Banknote and security
printing
1852
1964
1977
2
2007
…Stepping into the shoes of an evangelist
Thorsten Roeske
(Head of Products & Marketing for Giesecke & Devrient’s eIDentity Business Unit)
 For two decades security experts have been persuading us that a move away
from passwords, in favor of utilizing multifactor authentication technologies,
will bring the necessary level of security for online systems
 This paradigm may have been true with typical attacks although in recent
years a close look at active attack vectors (exploited by malware like ZEUS)
together with visible trends in malware development question their true
effectiveness
 This presentation will highlight why hardware technology alone fails to provide
identity assurance in today’s threat and attack environment
3
What You Know - What You Have - What You Are
The Role of Hardware Technologies to Provide Identity Assurance
What is the best role for hardwarebased authentication solutions
(such as smart cards, smart
phones, RFID devices and other
hardware tokens) in identity
management systems?
How scalable are they, what
deployments today have been
successful, and what does the
future hold for their use?
4
Changing Attack Vectors
5
Changing Attack Vectors
6
Changing Attack Vectors
man-inthe-PC
man-inthe-middle
man-in-the
browser
7
Emerging Attack Example – It’s real…
8
… very real….
eBanking Server
5
4
SmartCards
3
Connection to Server
2
1
0
OTP Token
User's PC
Password
9
User's Browser
The nature of online Fraud
Ross Anderson, Prof. Security
Engineering, Computer Labs, University
of Cambridge:
"Computer criminals differ from ordinary
criminals in that they're more rational.
The bulk of street crime is done by
disadvantaged young men, often
illiterate and with drug or alcohol
problems. The bulk of e-crime is done
by technically sophisticated people… So
while preventing normal crime is about
sociology, preventing online crime is
about economics. Malware writers are
rational, as are botnet herders…. "
10
>$100k
LOW
HACKING ROI
…..preventing
online crime is
about economics!
HIGH
HACKING ROI
<$2k
Standard Browser (e.g.
Firefox) with 2-Factor
Authentication like OTP,
SMART CARD or
EMV Card
The nature of online Fraud
Ross Anderson, Prof. Security
Engineering, Computer Labs, University
of Cambridge:
"Computer criminals differ from ordinary
criminals in that they're more rational.
The bulk of street crime is done by
disadvantaged young men, often
illiterate and with drug or alcohol
problems. The bulk of e-crime is done
by technically sophisticated people… So
while preventing normal crime is about
sociology, preventing online crime is
about economics. Malware writers are
rational, as are botnet herders…. "
11
eBanking Server
5
4
SmartCards
3
Connection to Server
2
1
0
OTP Token
User's PC
Password
User's Browser
Highest
ROI
The nature of online Fraud
INFACE-MAN
DISPLAY
MOUSE
SCREEN-C
KEY-LOG
KEYBOARD
MOUSE-LOG
HISTORY
USER
USER
INTERFACE
INTERFACE
ACTIVE X
EXT. CERT
STORE
COOKIES
APP-STEER
MDW
SPOOF
CACHE
COMP-MAN
MEM-PATCH
Robert G. Ferrell, Information Systems
Security Specialist, U.S.A. Dept. of Defense:
MEM-DUMP
PDF
CERT
BROW-CERT
STORE
USER
USER
DATA
SNIFF
EXTENSIONS
EXTENSIONS
PLUGINS
PLUGINS
DATA
DATA
BROWSER
BROWSER
KERNEL
KERNEL
FLASH
SESSION
REV-ENG
CODE-INJ
PWD
MGR
COMP-MAN
JAVA
BOOKMARKS
DOM
DOM-MANIPU
PWDS
CH-BREAK
RENDERING
RENDERING
ENGINE
ENGINE
SSL
TLS
LAYOUT
BUFFOVFLW
BROW-SSL
NETWORK
BROW-DNS
JAVA
SCRIPT
SCRIPT
SCRIPT
HTML
XML
12
"….. Far more relevant to security are the
browser clients a consumer is using
irrespective of the operating system or
hardware platform.
Even more critical from a safety standpoint is
the level of security awareness exhibited by
that consumer. If you haphazardly visit every
Web link …sooner or later you're going to get
nailed. Period."
Attacks focusing on the OS and/or the Browser provide the
greatest return on investment (for the bad guys!)
Examples of MITPC and MITB Current Attacks:
APP-STEER
= Application Steering
BROW-CERT
= Browser Certificate Store Compromise
BROW-DNS
= Browser DNS Library Compromise
BROW-SSL
= Browser SSL Library Compromise
CERT-SPOOF
= Certificate Spoofing
CH-BREAK
= Channel Breaking
CODE-INJ
= Code Injection
DNS-SPOOF
= DNS Spoofing/Poisoning
DOM-CAPTCH= DOM Data Capturing/Patching
HFILE-MAN
= Hosts File Manipulation
INFACE-MAN
= Interface Manipulation
IP-RROUTE
= IP Rerouting
KEY-LOG
= Keystroke Logging
MOUSE-LOG
= Mouse Event Logging
MEM-DUMP
= Memory Dumping
MEM-PATCH
= Memory Patching
OS-CERT
= OS Certificate Store Compromise
OS-DNS
= OS DNS Library Compromise
OS-SSL
= OS SSL Library Compromise
REV-ENG
= Reverse Engineering
SCREEN-C
= Screen Capturing
SCRIPT
= Script Injection
SOC-ENG
= Social Engineering
DATA-SNIFF
= User Data Sniffing
WIND-OVER
= Window Overlay
13
Versatile Authentication Methods – The Reality Today
Biometrics
(Biological)
Barrier to Entry / Complexity
Biometrics
(Behavioral)
Smart Card
(PKI)
OTP
Token / EMV
Soft Token
Out-of-Band
Authentication
Knowledge-Based
Authentication
Adaptive
Authentication
Password
Lightweight
OTP
Advanced
Password
Assurance Strength
14
Versatile Authentication Methods – With Hardened
Browser
Barrier to Entry / Complexity
Biometrics
(Biological)
Biometrics
(Behavioral)
Smart Card
(PKI)
OTP
Token / EMV
Soft Token
Out-of-Band
Authentication
Knowledge-Based
Authentication
Lightweight
Adaptive
OTP
Authentication
Advanced
Password
Password
Assurance Strength
15
Addressing the Weakest Link: The Browser
 A Hardened Web browser protecting the
user against new attack vectors by
 using code OBFUSCATION
 POLYMORPHIC and VIRTUALIZATION
techniques
 PERIODIC UPDATES of the executable
code (confuses hackers forcing them to
renew efforts when developing code to
attack the hardened application)
 No Installation nor special rights required of
the user
 Optimized for online transactions
 Easy integration into Application Servers at
the back end (such as eBanking Portals)
 Operates without changes to existing IT
infrastructure
 Constant updates to mitigate the ever
increasing attack landscape
16
What You Know - What You Have - What You Are
The Role of Hardware Technologies to Provide Identity Assurance




17
Indications are that the use of
traditional HW technology continues
to increase
Used in combination with a Trusted
UI (such as a Hardened Browser),
HW Technology plays a key role in
user authentication
New B2C markets are looking to
embrace HW Technology for strong
authentication
…but the ecosystem is evolving
Looking Forward - Vendors are paying close attention...





A Trusted Execution Environment (TEE)
can be utilized in parallel to any rich OS in
the mobile device (inc. Netbooks and
Tablets)
TEE’s can be considered as “virtual smart
cards” deeply embedded in the mobile
device
TEE applications, so called Trustlets,
execute security critical processes in
isolated processing space on the
controller
TEE’s can integrate with other security
technologies such as SIM cards and/or
Secure MicroSD cards
Applications and Credentials can be
securely provisioned over the air (OTA)
18
Application Processor
“Creating Confidence”
Thank You!!
19
Download