Perimeter
1/29/2012
10:40 AM
Taher Elgamal
Taher Elgamal
Commentary
Connect Directly
RSS
E-Mail
50%
50%

The Value Of Device Authentication

'Fingerprinting' evolving to protect device IDs

Since the beginning of e-commerce in the mid-1990s, businesses noticed that transactions conducted online can be strengthened in assurance if we can “remember” that a particular device is the same that was used before to conduct successful transactions. A known device provides knowledge about the history of the device and can mitigate against fraudulent transactions that use stolen cards.

Later on, similar techniques now referred to as device fingerprinting are quite popular in detecting devices that have been used to conduct fraud online. Several businesses have started up that provide knowledge about connected devices.

Fraudsters have since responded with techniques to continuously change the device ID in order to deceive these systems. Furthermore, the use of botnets has increased in the fraud rings since these devices are likely to only appear one time and are impossible to detect in this regard.

Having said all that, it is useful to remember devices that users have used to conduct online transactions, and to tie these to the fraud history of the devices. Many different techniques are used today to fingerprint devices, mostly using browser environment fingerprinting, but some actually use techniques that detect certain characteristics about the machine hardware itself.

Several industry efforts are working on improved and perhaps cryptographically strong versions of a device ID. These techniques will become available soon and will help prevent fraudsters from making their machines “look different” every time they use them. I will discuss this a bit more in my next blog.

Dr. Taher Elgamal is the inventor of the Elgamal Digital Signature scheme, which is the basis for Digital Signature Algorithm (DSA). While serving as chief scientist of Netscape Communications, he was the driving force behind SSL. He is the founder of IdentityMind.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JJ1819
50%
50%
JJ1819,
User Rank: Apprentice
1/31/2012 | 5:31:47 AM
re: The Value Of Device Authentication
A single solution for authentication is fingerprinting, it is the unique id which is highly impossible to misuse.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1556
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php.

CVE-2014-2008
Published: 2014-09-12
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.

CVE-2014-2009
Published: 2014-09-12
The mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to obtain credentials, the installation path, and other sensitive information via a direct request to api/curllog.log.

CVE-2014-4735
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in MyWebSQL 3.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter to index.php.

CVE-2014-5259
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in cattranslate.php in the CatTranslate JQuery plugin in BlackCat CMS 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant