Logo des Repositoriums
 

Using Trusted Execution Environments in Two-factor Authentication: comparing approaches

dc.contributor.authorRijswijk-Deij, Roland van
dc.contributor.authorPoll, Erik
dc.contributor.editorHühnlein, Detlef
dc.contributor.editorRoßnagel, Heiko
dc.date.accessioned2018-10-10T08:35:34Z
dc.date.available2018-10-10T08:35:34Z
dc.date.issued2013
dc.description.abstractClassic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environment). A reason for this success are the strong security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physically separate device. This paper investigates whether Trusted Execution Environments (TEE) can be used to achieve a comparable level of security without the need to have a separate device. To do this, we introduce a model that shows the security properties of user interaction in two-factor authentication. The model is used to examine two TEE technologies, Intel's IPT and ARM TrustZone, revealing that, although it is possible to get close to classic two-factor authentication in terms of user interaction security, both technologies have distinct drawbacks. The model also clearly shows an open problem shared by many TEEs: how to prove to the user that they are dealing with a trusted application when trusted and untrusted applications share the same display.en
dc.identifier.isbn978-3-88579-617-6
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/17195
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofOpen Identity Summit 2013
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-223
dc.subjecttrusted execution environment
dc.subjectIntel Identity Protection Technology
dc.subjectIPT
dc.subjectARM TrustZone
dc.subjecttwo-factor authentication
dc.titleUsing Trusted Execution Environments in Two-factor Authentication: comparing approachesen
dc.typeText/Conference Paper
gi.citation.endPage31
gi.citation.publisherPlaceBonn
gi.citation.startPage20
gi.conference.date10.-11.09.2013
gi.conference.locationKloster Banz
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
20.pdf
Größe:
146.48 KB
Format:
Adobe Portable Document Format