Perimeter
1/29/2012
10:40 AM
Taher Elgamal
Taher Elgamal
Commentary
Connect Directly
RSS
E-Mail
50%
50%

The Value Of Device Authentication

'Fingerprinting' evolving to protect device IDs

Since the beginning of e-commerce in the mid-1990s, businesses noticed that transactions conducted online can be strengthened in assurance if we can “remember” that a particular device is the same that was used before to conduct successful transactions. A known device provides knowledge about the history of the device and can mitigate against fraudulent transactions that use stolen cards.

Later on, similar techniques now referred to as device fingerprinting are quite popular in detecting devices that have been used to conduct fraud online. Several businesses have started up that provide knowledge about connected devices.

Fraudsters have since responded with techniques to continuously change the device ID in order to deceive these systems. Furthermore, the use of botnets has increased in the fraud rings since these devices are likely to only appear one time and are impossible to detect in this regard.

Having said all that, it is useful to remember devices that users have used to conduct online transactions, and to tie these to the fraud history of the devices. Many different techniques are used today to fingerprint devices, mostly using browser environment fingerprinting, but some actually use techniques that detect certain characteristics about the machine hardware itself.

Several industry efforts are working on improved and perhaps cryptographically strong versions of a device ID. These techniques will become available soon and will help prevent fraudsters from making their machines “look different” every time they use them. I will discuss this a bit more in my next blog.

Dr. Taher Elgamal is the inventor of the Elgamal Digital Signature scheme, which is the basis for Digital Signature Algorithm (DSA). While serving as chief scientist of Netscape Communications, he was the driving force behind SSL. He is the founder of IdentityMind.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JJ1819
50%
50%
JJ1819,
User Rank: Apprentice
1/31/2012 | 5:31:47 AM
re: The Value Of Device Authentication
A single solution for authentication is fingerprinting, it is the unique id which is highly impossible to misuse.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio