Finale Version

advertisement
1
LEVERAGING UICC WITH OPEN MOBILE API
FOR SECURE APPLICATIONS AND SERVICES
4/13/2015
Ran Zhou
Motivation
2





Smartphones become the handheld computer and the
personal assistant
Growing market has attracted hackers to make the potential
for serious security threats on smartphones a reality
UICC serves as the security anchor in mobile networks
GSM Association: the UICC is the strategically best
alternative as a secure element for mobile devices [Sma09]
Interface is required to fill the gap between UICC applets
and mobile applications
4/13/2015
Solution Idea
3

SIMAlliance Open Mobile API: the communication channel
Dual Application Architecture: the basic architecture

An example: Smart OpenID

4/13/2015
Agenda
4






Motivation and Solution Idea
Basic Technologies
State of the Art
Smart OpenID
Implementation
Summary and Future Work
4/13/2015
Universal Integrated Circuit Card: UICC
5




The bearer of the subscriber’s identity in cellular networks
Secure element
secure storage, cryptographic functions
Secure channel
transmission between the UICC and the server with
authenticity, integrity, confidentiality
Wireless PKI
mobile network operator owns root certificate: becomes a
certificate authority
4/13/2015
Open Mobile API
6
Open Mobile API is established by SIMalliance as an open API between
secure element and the mobile applications
Open Mobile API
•
•
•
•
•
Crypto
Authentication
Secure Storage
PKCS#15
…
4/13/2015
Open Mobile API
7
4/13/2015
Agenda
8






Motivation and Solution Idea
Basic Technologies
State of the Art
Smart OpenID
Implementation
Summary and Future Work
4/13/2015
State of the Art
9




Financial applications
online-banking, contactless payment, tickets apps
Enterprise applications
secure Email, ERP, Software as a Service
Content protection applications
digital rights management, secure document
Authentication applications
generic bootstrapping architecture, public key infrastructure
4/13/2015
State of the Art
10





Malware
virus, Trojan horse, Spyware
Eavesdropping
traffic (password) on the network
Man-in-the-middle
attacker manipulates the transmitted data
Replay attacks
a valid data is maliciously repeated or delayed
Phishing
acquires data by masquerading as a trustworthy entity
4/13/2015
State of the Art
11




Private information is the main aim of the attacker, e.g.,
password, credit card number etc.
Anti-Malware, secure storage, digital certificate, transport
layer security, authentication etc.
Some countermeasures are unusual on smartphone
Existed protocols are vulnerable to different attacks
4/13/2015
Agenda
12






Motivation and Solution Idea
Basic Technologies
State of the Art
Smart OpenID
Implementation
Summary and Future Work
4/13/2015
OpenID
13
Relying
RelyingParty
Parties
Association session:
a shared symmetric key +
association handle
Authentication
response: signed with
the shared key
User
Device
OpenID Provider
Threats to OpenID
14





Malware
virus, Trojan horse, Spyware
Eavesdropping
password on the network
Man-in-the-middle
attacker captures the transmitted password, authentication
assertion, optionally alters it
Replay attacks
a valid authentication assertion is maliciously repeated
Phishing
acquire password by masquerading as an OP
4/13/2015
Smart OpenID: Concept
15


Authentication factor
 something the user knows: password
 something the user has: smart card
 something the user is: finger print
Using UICC as credential
 shares a long-term secret (LTS) with the server
 derives a key from the LTS and an one-time password
 PIN verification to activate the function
4/13/2015
Smart OpenID
16
Relying
RelyingParty
Parties
Association handle
+ derived key (symmetric)
Signed assertion
(with same derivated key)
User
Local authentication
(with PIN)
Local OP Provider =
Mobile Application
+ UICC Applet
Network OpenID Provider
Trust (long-term secret)
Smart OpenID
17



Long-term secret: 64 bytes
Association handle: less than 255 bytes
Key derivation functions: PBKDF2


use HMAC-SHA-1/HMAC-SHA-256 (hash-based message
authentication code) as underlying algorithm
configurable iteration count and derived key length
Security Analysis
18
Smart OpenID Authentication
Compromise
UC
User credential
compromise
PH1
Plaintext
Credential
phishing
PH2
DK Phishing
by mobile
application
CR
Derived key
phishing and
cryptanalysis
PH3
DK Phishing
by malicious
RP (Type 1)
MM
Man-in-themiddle attack
SN
Sniffing
PH4
DK Phishing
by malicious
RP (Type 2)
TH
Theft of
the UICC
PC
PIN
compromise
with Bruteforce attack
UK
Use of known
authentication
response
RP
Replay
attack
SW
Session
swapping
attack
Security Analysis : Phishing
19
Local OP = UICC App + Mobile App
UICC App
Mobile App
Browser
Malicious RP
Net OP
Auth Request (identifier)
Discovery and Association
Association (S, AH)
Derived Key S = PBKDF2-HMAC-SHA-1(LTS, AH, 64, 64)
Agenda
20






Motivation and Solution Idea
Basic Technologies
State of the Art
Smart OpenID
Implementation
Summary and Future Work
4/13/2015
Implementation
21

Platform
Android 2.3.5
Java Card UICC 2.2.1

Algorithms
key derivation function: PBKDF2-HMAC-SHA-1
signature: HMAC-SHA-1
4/13/2015
22
Demo
4/13/2015
Performance
23
Iteration : 64 rounds
AH: 240 bytes
Derived key length: 64 bytes
4/13/2015
Performance
24
Derived key length: 64 bytes
4/13/2015
Agenda
25






Motivation and Solution Idea
Basic Technologies
State of the Art
Smart OpenID
Implementation
Summary and Future Work
4/13/2015
Summary
26




UICC as secure element on smartphones
Dual Application Architecture with Open Mobile API
Improve existed protocols with the UICC
Other usages:




Digital certificate
Wireless PKI
NFC payment
…
4/13/2015
Future Work
27


Smart OpenID with HMAC-SHA-256
Implementation of other applications
4/13/2015
28
Thank you!
Questions?
4/13/2015
Bibliographie
29
[Sma09]
SmartTrust. The role of SIM OTA and the mobile operator in the NFC environment, 4 2009.
4/13/2015
Smartphone
30



Mobile phone
voice communication and messaging
Feature phone
digital camera, gaming, music and video streaming
Smartphone
modern operating system, high speed connectivity, thirdparty applications ...
4/13/2015
Access Control Module
31
4/13/2015
Security Analysis : Phishing
32
Local OP = UICC App + Mobile App
UICC App
Malicious App
Auth Request (assoc_handle)
Auth Response (signed assertion)
Mobile App
Browser
RP
NetOP
Security Analysis : Phishing
33
Local OP = UICC App + Mobile App
UICC App
Mobile App
Browser
Malicious RP
Auth Request (identifier)
Redirect to LocalOP (AH)
Auth Request (AH)
Auth Request (AH)
Auth Response (signed assertion)
Auth Request (sa)
Auth Request (sa)
Net OP
Download