Perimeter
1/29/2012
10:40 AM
Taher Elgamal
Taher Elgamal
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

The Value Of Device Authentication

'Fingerprinting' evolving to protect device IDs

Since the beginning of e-commerce in the mid-1990s, businesses noticed that transactions conducted online can be strengthened in assurance if we can “remember” that a particular device is the same that was used before to conduct successful transactions. A known device provides knowledge about the history of the device and can mitigate against fraudulent transactions that use stolen cards.

Later on, similar techniques now referred to as device fingerprinting are quite popular in detecting devices that have been used to conduct fraud online. Several businesses have started up that provide knowledge about connected devices.

Fraudsters have since responded with techniques to continuously change the device ID in order to deceive these systems. Furthermore, the use of botnets has increased in the fraud rings since these devices are likely to only appear one time and are impossible to detect in this regard.

Having said all that, it is useful to remember devices that users have used to conduct online transactions, and to tie these to the fraud history of the devices. Many different techniques are used today to fingerprint devices, mostly using browser environment fingerprinting, but some actually use techniques that detect certain characteristics about the machine hardware itself.

Several industry efforts are working on improved and perhaps cryptographically strong versions of a device ID. These techniques will become available soon and will help prevent fraudsters from making their machines “look different” every time they use them. I will discuss this a bit more in my next blog.

Dr. Taher Elgamal is the inventor of the Elgamal Digital Signature scheme, which is the basis for Digital Signature Algorithm (DSA). While serving as chief scientist of Netscape Communications, he was the driving force behind SSL. He is the founder of IdentityMind.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JJ1819
50%
50%
JJ1819,
User Rank: Apprentice
1/31/2012 | 5:31:47 AM
re: The Value Of Device Authentication
A single solution for authentication is fingerprinting, it is the unique id which is highly impossible to misuse.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web