{"title":"Tunneled TLS for multi-factor authentication","authors":"D. Kirovski, Christopher Meek","doi":"10.1145/2046631.2046639","DOIUrl":null,"url":null,"abstract":"When logging onto a remote server, <i>s</i>, from a distrusted terminal, <i>c</i>, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, <i>p</i>, as the interface available to users for entering their login credentials. In our proposal, <i>p</i> would send the credentials to <i>s</i> using a tunneled TLS session routed via <i>c</i>. The tunneling would be done within an existing TLS session established between <i>c</i> and <i>s</i>. Upon validating the credentials, <i>s</i> would enable <i>c</i> to access the user account. Consequently, <i>c</i> would never see in plain-text user's credentials. As a powerful application, we show that <i>p</i> could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, <i>c</i>, using an account managed by the card-issuing bank, <i>s</i>.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046631.2046639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
When logging onto a remote server, s, from a distrusted terminal, c, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, p, as the interface available to users for entering their login credentials. In our proposal, p would send the credentials to s using a tunneled TLS session routed via c. The tunneling would be done within an existing TLS session established between c and s. Upon validating the credentials, s would enable c to access the user account. Consequently, c would never see in plain-text user's credentials. As a powerful application, we show that p could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, c, using an account managed by the card-issuing bank, s.