SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
Codebits 2011
The End Of Passwords...
                 11/11/11
Summary

  Summary:
                              •	
  Mo&va&on

                              •	
  Today’s	
  scenario

                              •	
  Two-­‐Factor	
  Authen&ca&on
                                 -­‐	
  Biometrics
                                 -­‐	
  So>ware	
  Tokens
                                 -­‐	
  Hardware	
  Tokens

                              •	
  Trends



SAPO	
  Websecurity	
  Team                                       2
Motivation > Lots of accounts compromised




SAPO	
  Websecurity	
  Team                 3
Motivation > Lots of accounts compromised




SAPO	
  Websecurity	
  Team                 4
Motivation > People Reuse Passwords

   •	
  	
  Password	
  Sharing:	
  73%	
  of	
  users	
  share	
  passwords	
  that	
  are	
  used	
  for	
  online	
  banking	
  
   with	
  at	
  least	
  one	
  non-­‐financial	
  website.
   •	
  	
  Username	
  /	
  Password	
  Sharing:	
  42%	
  of	
  users	
  share	
  both	
  their	
  username	
  and	
  
   password	
  with	
  at	
  least	
  one	
  non-­‐financial	
  website
 Study	
  on	
  4M	
  PCs                  in	
  Reusing	
  Login	
  Creden.als,	
  Security	
  Advisor,	
  	
  February	
  2010,	
  Trusteer	
  Inc.




SAPO	
  Websecurity	
  Team                                                                                                                             5
Today



 Typical	
  choice	
  of	
  passwords	
  on	
  the	
  Web:

    • Weak	
  password	
  and	
  reused	
  in	
  different	
  sites
    • Strong	
  password	
  but	
  reused	
  in	
  different	
  sites
    • Weak	
  password	
  but	
  different	
  from	
  other	
  sites
    • Strong	
  password	
  for	
  criIcal	
  sites,	
  Weak	
  password	
  for	
  other	
  sites
    • Strong	
  or	
  weak	
  password	
  and	
  basic	
  derivaIons	
  on	
  other	
  sites


SAPO	
  Websecurity	
  Team                                                                         6
Today


                Can	
  we	
  memorize	
  hundreds	
  
                   of	
  strong	
  passwords?




SAPO	
  Websecurity	
  Team                             7
Today



                              No	
  way!




SAPO	
  Websecurity	
  Team                8
Today




                              So	
  what	
  can	
  we	
  do?




SAPO	
  Websecurity	
  Team                                    9
Alternatives > Password Managers

    Password	
  Managers
         Use	
  a	
  password	
  manager	
  to	
  manage	
  all	
  your	
  passwords	
  instead	
  of	
  trying	
  to	
  memorize	
  
         them	
  all


    Types:
       •	
  Local
       •	
  Stateless
       •	
  Remote
    Pros:
        • easy	
  to	
  use
        • prac&cal
        • enable	
  you	
  to	
  use	
  strong	
  and	
  
            different	
  passwords	
  across	
  sites

    Cons:
        • If	
  a	
  hacker	
  breaks	
  your	
  password	
  
            manager,	
  ALL	
  your	
  passwords	
  are	
  
            compromised!
SAPO	
  Websecurity	
  Team                                                                                                             10
Passwords


     But	
   Passwords	
   per	
   se	
   are	
   not	
   a	
   secure	
  
     authenIcaIon	
  mechanism


     A	
  password	
  is	
   a	
  piece	
  of	
  informaIon,	
  that	
  can	
  be	
  
     shared,	
  leaked	
  or	
  stolen.	
  


                 Someone	
  with	
  your	
  password	
  =	
  you


SAPO	
  Websecurity	
  Team                                                             11
Alternatives


     What	
  is	
  the	
  alternaIve?
               MulL-­‐Factor	
  AuthenLcaLon


                              Any	
  combinaIon	
  of	
  these:

                              •	
  Something	
  you	
  know
                              •	
  Something	
  you	
  have
                              •	
  Something	
  you	
  are


SAPO	
  Websecurity	
  Team                                       12
Two-Factor Auth




      The	
  most	
  popular	
  combinaIon	
  is	
  the	
  
      2-­‐factor	
  authenIcaIon:	
  “something	
  
      you	
  know”	
  and	
  “something	
  you	
  have”



SAPO	
  Websecurity	
  Team                                   13
Two-Factor Auth




           ...	
  but	
  the	
  second	
  (physical)	
  factor	
  cannot	
  be	
  stolen?




SAPO	
  Websecurity	
  Team                                                                 14
Two-Factor Auth

      ...sure,	
  but	
  it	
  is	
  about	
  scale.




SAPO	
  Websecurity	
  Team                            15
Two-Factor Authentication




                  Two-­‐Factor	
  AuthenLcaLon




SAPO	
  Websecurity	
  Team                      16
Two-Factor Auth > Examples

    Some	
  Examples
       •	
  Biometrics	
  
       •	
  Smart	
  cards
       •	
  SMS
       •	
  So>ware	
  OTP	
  Tokens:
             -­‐	
  Google	
  AuthenIcator
             -­‐	
  Verisign	
  VIP
       •	
  Hardware	
  OTP	
  Tokens:
            -­‐	
  Yubikey
            -­‐	
  CryptoCard
            -­‐	
  RSA	
  SecureID

    Pros:
         • More	
  secure	
  than	
  single-­‐
             factor:)
   Cons:
     • Not	
  very	
  convenient
     • May	
  provide	
  a	
  false	
  sense	
  of	
  security
     • Typically	
  a	
  closed	
  market	
  (most	
  
       vendors	
  rip	
  you	
  off!)
SAPO	
  Websecurity	
  Team                                      17
Two-Factor Auth > Biometrics

    Biometrics
          Verifies	
  a	
  unique	
  personal	
  aYribute	
  or	
  behavior.	
  Divided	
  into	
  two	
  categories:	
  
          physiological	
  (iris,	
  re&na,	
  fingerprint)	
  or	
  behavioral	
  (signature,	
  keystroke,	
  voice	
  dynamics)


    Pros:
        • effec&ve	
  and	
  accurate	
  method	
  of	
  iden&fica&on
    Cons:
        •   Cannot	
  be	
  re-­‐issued!	
  
        •   Expensive	
  ($$$$$)
        •   Privacy	
  concerns
        •   Physical	
  and	
  Behavioral	
  aYributes	
  can	
  change
        •   Not	
  suitable	
  for	
  all	
  scenarios
        •   Can	
  be	
  dangerous!	
  (If	
  thief	
  cuts	
  your	
  finger	
  off)




SAPO	
  Websecurity	
  Team                                                                                                    18
Two-Factor Auth > Biometrics

    Biometrics
    Usage:
         • Could	
  be	
  used	
  for	
  Internet	
  banking,	
  to	
  confirm	
  the	
  authen&city	
  of	
  a	
  high-­‐value	
  
           transac&on
         • Can	
  be	
  used	
  for	
  authen&ca&on	
  in	
  computers,	
  other	
  systems	
  or	
  applica&ons




SAPO	
  Websecurity	
  Team                                                                                                          19
Two-Factor Auth > Smart Cards

    Smart	
  Cards
          A	
  smart	
  card	
  has	
  the	
  capability	
  of	
  processing	
  informa&on	
  because	
  it	
  has	
  a	
  
          microprocessor	
  and	
  integrated	
  circuits	
  incorporated	
  into	
  the	
  card	
  itself.
          Two-­‐factor	
  =	
  PIN	
  +	
  Smart	
  Card	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Types	
  =	
  contact	
  and	
  contactless

    Pros:
        • Good	
  security	
  offered,	
  the	
  secret	
  
            never	
  leaves	
  the	
  smartcard



    Cons:
        • Not	
  very	
  convenient
        • You	
  may	
  need	
  to	
  install	
  drivers	
  
            before	
  using
        •   May	
  provide	
  a	
  false	
  sense	
  of	
  security




SAPO	
  Websecurity	
  Team                                                                                                                       20
Two-Factor Auth > Smart Cards

    Smart	
  Cards
    Usage:
       • Some	
  sites	
  allow	
  you	
  to	
  use	
  SSL	
  Client	
  cer&ficates	
  as	
  a	
  
         mean	
  of	
  authen&ca&on.	
  Cer&ficates	
  can	
  be	
  stored	
  in	
  a	
  
         Smart	
  Card.	
  
          • Some	
  sites	
  allow	
  you	
  to	
  authen&cate	
  through	
  the	
  smart	
  
             card	
  (some	
  government	
  sites	
  using	
  the	
  ci&zen	
  card)
          • You	
  can	
  use	
  a	
  smart	
  card	
  to	
  sign	
  email,	
  documents,	
  
             authen&cate	
  to	
  WiFi	
  networks	
  and	
  SSH,	
  use	
  them	
  with	
  
             PAM,	
  and	
  more...




SAPO	
  Websecurity	
  Team                                                                         21
Two-Factor Auth > Smart Cards

    SMS
          Some	
  sites	
  can	
  send	
  a	
  text	
  message	
  as	
  a	
  2nd	
  factor	
  of	
  authen&ca&on



    Pros:
        • Easy	
  to	
  implement
        • No	
  need	
  to	
  carry[/buy]	
  extra	
  devices	
  (your	
  
            mobile	
  phone	
  is	
  always	
  with	
  you)



    Cons:

       • It’s	
  probably	
  the	
  weakest	
  2nd-­‐factor	
  (easy	
  to	
  fake	
  
           and	
  intercept)




SAPO	
  Websecurity	
  Team                                                                                        22
Two-Factor Auth > Google Authenticator

    One	
  Time	
  Passwords	
  (OATH)
          It	
  can	
  be	
  HOTP	
  (event-­‐based)	
  or	
  TOTP	
  (&me-­‐based).



    Pros:
        • It’s	
  an	
  Open	
  Standard
        • You	
  can	
  use	
  it	
  in	
  your	
  own	
  systems	
  (using	
  a	
  PAM	
  
            Module	
  or	
  integra&ng	
  it	
  with	
  RADIUS)
        •   You	
  have	
  mul&ple	
  implementa&ons	
  that	
  work	
  
            on	
  a	
  panoply	
  of	
  devices	
  (e.g.	
  smartphone,	
  
            yubikey,	
  hardware	
  tokens)

    Cons:
        • Concerns	
  related	
  to	
  security	
  of	
  the	
  device	
  (in	
  
            so>ware	
  implementa&ons)
        •   Your	
  baYery	
  may	
  die	
  when	
  you	
  most	
  need	
  an	
  OTP	
  
            (in	
  case	
  of	
  a	
  smartphone)
        •   You	
  lose	
  some	
  &me	
  to	
  generate/enter	
  an	
  OTP

SAPO	
  Websecurity	
  Team                                                                   23
Two-Factor Auth > Yubikey > What is it?
What	
  is	
  it?
       •    The	
  Yubikey	
  is	
  a	
  small	
  USB	
  token	
  which	
  acts	
  as	
  a	
  regular	
  keyboard.	
  It	
  can	
  
            generate	
  StaIc	
  Passwords	
  and	
  One	
  Time	
  Passwords.	
  




SAPO	
  Websecurity	
  Team                                                                                                           24
Two-Factor Auth > Yubikey > How does it work?
 StaLc	
  Passwords
    • The	
  Yubikey	
  can	
  be	
  provisioned	
  with	
  a	
  staIc	
  password	
  with	
  up	
  to	
  64	
  
           chars.	
  This	
  password	
  can	
  be	
  used	
  with	
  applicaIons/services	
  that	
  do	
  not	
  
           support	
  OTPs.	
  You	
  should	
  use	
  an	
  addiIonal	
  password!
 One	
  Time	
  Passwords
       •    Two	
  different	
  One	
  Time	
  Password	
  standards	
  are	
  supported:	
  event-­‐based	
  
            HOTP	
  and	
  Yubikey-­‐style	
  OTPs.
       •    HOTP	
  is	
  a	
  be^er	
  known	
  standard,	
  but	
  it	
  is	
  more	
  limited	
  due	
  to	
  usability	
  
            concerns	
  (smaller	
  OTP,	
  sync	
  issues,	
  etc.).
       •    The	
  Yubikey	
  OTP	
  standard	
  leverages	
  the	
  fact	
  that	
  the	
  Yubikey	
  inputs	
  the	
  
            OTPs	
  for	
  you.
 Two	
  slots
   • Short-­‐press	
  for	
  slot	
  1;	
  Long-­‐press	
  for	
  slot	
  2	
  (3	
  secs);
 Drivers
     • Any	
  OS	
  with	
  USB-­‐keyboard	
  support.	
  It	
  even	
  works	
  during	
  boot	
  (useful	
  for,	
  
        e.g.,	
  whole-­‐disk	
  encrypIon	
  soluIons	
  such	
  as	
  PGP-­‐WDE	
  and	
  TrueCrypt).

SAPO	
  Websecurity	
  Team                                                                                                      25
Two-Factor Auth > Yubikey > Where does it work?
Lastpass	
  (h^p://www.lastpass.com)




SAPO	
  Websecurity	
  Team                       26
Two-Factor Auth > Yubikey > Where does it work?
Yubico	
  OpenID	
  (h^p://openid.yubico.com)




SAPO	
  Websecurity	
  Team                       27
Yubikey > Where does it work?
FastMail	
  (h^p://www.fastmail.fm)




SAPO	
  Websecurity	
  Team           28
Two-Factor Auth > Yubikey > Where does it work?
Laptop	
  	
  (h^p://127.0.0.1)




                  One	
  Time	
  Password   Sta&c	
  Password



SAPO	
  Websecurity	
  Team                                     29
Yubikey > Where could it work?
Architecture




SAPO	
  Websecurity	
  Team      30
Two-Factor Auth > Yubikey > Details
Inner	
  workings	
  (Protocol	
  spec	
  is	
  Open)




SAPO	
  Websecurity	
  Team                             31
Two-Factor Auth > Yubikey > Security Threats
Protocol	
  a^acks
   • Generated	
  OTPs	
  consist	
  of	
  unique	
  128	
  bit	
  blocks	
  encrypted	
  with	
  a	
  shared	
  
      AES	
  key	
  between	
  Token	
  and	
  Server.	
  Protocol	
  security	
  depends	
  on	
  the	
  
      security	
  strength	
  of	
  the	
  AES	
  algorithm.




SAPO	
  Websecurity	
  Team                                                                                         32
Two-Factor Auth > Yubikey > Security Threats

 Server	
  a^acks
    • Central	
  authenIcaIon	
  servers	
  store	
  symmetric	
  keys	
  for	
  all	
  Tokens.	
  If	
  successfully	
  
           a^acked,	
  this	
  can	
  be	
  catastrophic.	
  Yubico	
  miIgates	
  this	
  with	
  tamper-­‐proof	
  HSMs.	
  
       •    A	
  DoS	
  a^ack	
  on	
  the	
  server	
  will	
  result	
  in	
  users	
  not	
  being	
  able	
  to	
  log	
  in.




SAPO	
  Websecurity	
  Team                                                                                                         33
Two-Factor Auth > Yubikey > Security Threats

 User	
  a^acks
    • Social	
  engineering;
       •    Phishing;
       •    “Borrowing”	
  the	
  Token.




SAPO	
  Websecurity	
  Team                    34
Two-Factor Auth > Yubikey > Security Threats

 Host	
  a^acks
     • Soeware	
  key	
  extracIon	
  (very	
  hard	
  to	
  exploit);
        •    Man-­‐in-­‐the-­‐browser.




SAPO	
  Websecurity	
  Team                                              35
Two-Factor Auth > Yubikey > Security Threats

  Hardware	
  a^acks
     • Hardware	
  key	
  extracIon	
  and	
  Token	
  duplicaIon.




SAPO	
  Websecurity	
  Team                                          36
Two-Factor Auth > Yubikey > Advantages
Convenient
   • No	
  drivers	
  necessary
         •     Types	
  the	
  key	
  for	
  you

Open
  • Open	
  standard	
  and	
  infrastructure
     •       Soeware	
  released	
  under	
  permissive	
  license
     •       Extensible	
  (PIN	
  opIon)
     •       No	
  license	
  required	
  per	
  token
Affordable
  • Around	
  10€	
  if	
  purchased	
  in	
  larger	
  quanIIes

Secure
  • Provides	
  an	
  addiIonal	
  authenIcaIon	
  factor
    •        OTP	
  generaIon	
  requires	
  manual	
  intervenIon



SAPO	
  Websecurity	
  Team                                          37
Two-Factor Auth > NFC/RFID


 NFC/RFID
     We	
  can	
  use	
  the	
  technology	
  for	
  many	
  purposes,	
  including	
  authen&ca&on

    Pros:
        • Could	
  be	
  very	
  convenient
        • No	
  need	
  to	
  carry[/buy]	
  extra	
  devices	
  (your	
  
            mobile	
  phone	
  is	
  always	
  with	
  you)



    Cons:

       • The	
  security	
  aspects	
  are	
  s&ll	
  being	
  discussed.	
  
           (Mifare	
  1K	
  and	
  DESFire	
  tags	
  can	
  be	
  cloned)
       •   In	
  reality,	
  there	
  are	
  no	
  standard	
  mechanisms	
  on	
  
           devices	
  to	
  use	
  NFC	
  authen&ca&on.



SAPO	
  Websecurity	
  Team                                                                           38
Trends > PoC




SAPO	
  Websecurity	
  Team   39
Future




                              Trends




SAPO	
  Websecurity	
  Team            40
Trends

 Two-­‐factor	
  AuthenLcaLon	
  is	
  gecng	
  Popular:




SAPO	
  Websecurity	
  Team                                41
Future


 QR	
  Codes
   Some	
  interesLng	
  ideas	
  are	
  brewing...




SAPO	
  Websecurity	
  Team                           42
Trends > BMWʼs NFC PoC




SAPO	
  Websecurity	
  Team   43
Links
Smart	
  Cards
   • OpenSC	
  Project	
  -­‐	
  h^p://www.opensc-­‐project.org
Yubikeys
  • Yubico	
  -­‐	
  h^p://www.yubico.com


Time-­‐based	
  and	
  event-­‐based	
  OTPs
  • Google	
  AuthenIcator	
  -­‐	
  h^p://code.google.com/p/google-­‐authenIcator/


NFC
 • libnfc-­‐	
  h^p://www.libnfc.org/documentaIon/introducIon

  QR	
  Codes
   • Iqr	
  -­‐	
  hYps://&qr.org/
Biometrics

   •     BioAPI	
  Consor&um	
  -­‐	
  hYp://www.bioapi.org/

SAPO	
  Websecurity	
  Team                                                           44
The End

                                         QuesLons?




 Nuno	
  Loureiro	
  <nuno@co.sapo.pt>          João	
  Poupino	
  <joao.poupino@co.sapo.pt>


SAPO	
  Websecurity	
  Team                                                               45

Weitere ähnliche Inhalte

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Codebits 2011 - The end of passwords...

  • 1. Codebits 2011 The End Of Passwords... 11/11/11
  • 2. Summary Summary: •  Mo&va&on •  Today’s  scenario •  Two-­‐Factor  Authen&ca&on -­‐  Biometrics -­‐  So>ware  Tokens -­‐  Hardware  Tokens •  Trends SAPO  Websecurity  Team 2
  • 3. Motivation > Lots of accounts compromised SAPO  Websecurity  Team 3
  • 4. Motivation > Lots of accounts compromised SAPO  Websecurity  Team 4
  • 5. Motivation > People Reuse Passwords •    Password  Sharing:  73%  of  users  share  passwords  that  are  used  for  online  banking   with  at  least  one  non-­‐financial  website. •    Username  /  Password  Sharing:  42%  of  users  share  both  their  username  and   password  with  at  least  one  non-­‐financial  website Study  on  4M  PCs in  Reusing  Login  Creden.als,  Security  Advisor,    February  2010,  Trusteer  Inc. SAPO  Websecurity  Team 5
  • 6. Today Typical  choice  of  passwords  on  the  Web: • Weak  password  and  reused  in  different  sites • Strong  password  but  reused  in  different  sites • Weak  password  but  different  from  other  sites • Strong  password  for  criIcal  sites,  Weak  password  for  other  sites • Strong  or  weak  password  and  basic  derivaIons  on  other  sites SAPO  Websecurity  Team 6
  • 7. Today Can  we  memorize  hundreds   of  strong  passwords? SAPO  Websecurity  Team 7
  • 8. Today No  way! SAPO  Websecurity  Team 8
  • 9. Today So  what  can  we  do? SAPO  Websecurity  Team 9
  • 10. Alternatives > Password Managers Password  Managers Use  a  password  manager  to  manage  all  your  passwords  instead  of  trying  to  memorize   them  all Types: •  Local •  Stateless •  Remote Pros: • easy  to  use • prac&cal • enable  you  to  use  strong  and   different  passwords  across  sites Cons: • If  a  hacker  breaks  your  password   manager,  ALL  your  passwords  are   compromised! SAPO  Websecurity  Team 10
  • 11. Passwords But   Passwords   per   se   are   not   a   secure   authenIcaIon  mechanism A  password  is   a  piece  of  informaIon,  that  can  be   shared,  leaked  or  stolen.   Someone  with  your  password  =  you SAPO  Websecurity  Team 11
  • 12. Alternatives What  is  the  alternaIve? MulL-­‐Factor  AuthenLcaLon Any  combinaIon  of  these: •  Something  you  know •  Something  you  have •  Something  you  are SAPO  Websecurity  Team 12
  • 13. Two-Factor Auth The  most  popular  combinaIon  is  the   2-­‐factor  authenIcaIon:  “something   you  know”  and  “something  you  have” SAPO  Websecurity  Team 13
  • 14. Two-Factor Auth ...  but  the  second  (physical)  factor  cannot  be  stolen? SAPO  Websecurity  Team 14
  • 15. Two-Factor Auth ...sure,  but  it  is  about  scale. SAPO  Websecurity  Team 15
  • 16. Two-Factor Authentication Two-­‐Factor  AuthenLcaLon SAPO  Websecurity  Team 16
  • 17. Two-Factor Auth > Examples Some  Examples •  Biometrics   •  Smart  cards •  SMS •  So>ware  OTP  Tokens: -­‐  Google  AuthenIcator -­‐  Verisign  VIP •  Hardware  OTP  Tokens: -­‐  Yubikey -­‐  CryptoCard -­‐  RSA  SecureID Pros: • More  secure  than  single-­‐ factor:) Cons: • Not  very  convenient • May  provide  a  false  sense  of  security • Typically  a  closed  market  (most   vendors  rip  you  off!) SAPO  Websecurity  Team 17
  • 18. Two-Factor Auth > Biometrics Biometrics Verifies  a  unique  personal  aYribute  or  behavior.  Divided  into  two  categories:   physiological  (iris,  re&na,  fingerprint)  or  behavioral  (signature,  keystroke,  voice  dynamics) Pros: • effec&ve  and  accurate  method  of  iden&fica&on Cons: • Cannot  be  re-­‐issued!   • Expensive  ($$$$$) • Privacy  concerns • Physical  and  Behavioral  aYributes  can  change • Not  suitable  for  all  scenarios • Can  be  dangerous!  (If  thief  cuts  your  finger  off) SAPO  Websecurity  Team 18
  • 19. Two-Factor Auth > Biometrics Biometrics Usage: • Could  be  used  for  Internet  banking,  to  confirm  the  authen&city  of  a  high-­‐value   transac&on • Can  be  used  for  authen&ca&on  in  computers,  other  systems  or  applica&ons SAPO  Websecurity  Team 19
  • 20. Two-Factor Auth > Smart Cards Smart  Cards A  smart  card  has  the  capability  of  processing  informa&on  because  it  has  a   microprocessor  and  integrated  circuits  incorporated  into  the  card  itself. Two-­‐factor  =  PIN  +  Smart  Card                      Types  =  contact  and  contactless Pros: • Good  security  offered,  the  secret   never  leaves  the  smartcard Cons: • Not  very  convenient • You  may  need  to  install  drivers   before  using • May  provide  a  false  sense  of  security SAPO  Websecurity  Team 20
  • 21. Two-Factor Auth > Smart Cards Smart  Cards Usage: • Some  sites  allow  you  to  use  SSL  Client  cer&ficates  as  a   mean  of  authen&ca&on.  Cer&ficates  can  be  stored  in  a   Smart  Card.   • Some  sites  allow  you  to  authen&cate  through  the  smart   card  (some  government  sites  using  the  ci&zen  card) • You  can  use  a  smart  card  to  sign  email,  documents,   authen&cate  to  WiFi  networks  and  SSH,  use  them  with   PAM,  and  more... SAPO  Websecurity  Team 21
  • 22. Two-Factor Auth > Smart Cards SMS Some  sites  can  send  a  text  message  as  a  2nd  factor  of  authen&ca&on Pros: • Easy  to  implement • No  need  to  carry[/buy]  extra  devices  (your   mobile  phone  is  always  with  you) Cons: • It’s  probably  the  weakest  2nd-­‐factor  (easy  to  fake   and  intercept) SAPO  Websecurity  Team 22
  • 23. Two-Factor Auth > Google Authenticator One  Time  Passwords  (OATH) It  can  be  HOTP  (event-­‐based)  or  TOTP  (&me-­‐based). Pros: • It’s  an  Open  Standard • You  can  use  it  in  your  own  systems  (using  a  PAM   Module  or  integra&ng  it  with  RADIUS) • You  have  mul&ple  implementa&ons  that  work   on  a  panoply  of  devices  (e.g.  smartphone,   yubikey,  hardware  tokens) Cons: • Concerns  related  to  security  of  the  device  (in   so>ware  implementa&ons) • Your  baYery  may  die  when  you  most  need  an  OTP   (in  case  of  a  smartphone) • You  lose  some  &me  to  generate/enter  an  OTP SAPO  Websecurity  Team 23
  • 24. Two-Factor Auth > Yubikey > What is it? What  is  it? • The  Yubikey  is  a  small  USB  token  which  acts  as  a  regular  keyboard.  It  can   generate  StaIc  Passwords  and  One  Time  Passwords.   SAPO  Websecurity  Team 24
  • 25. Two-Factor Auth > Yubikey > How does it work? StaLc  Passwords • The  Yubikey  can  be  provisioned  with  a  staIc  password  with  up  to  64   chars.  This  password  can  be  used  with  applicaIons/services  that  do  not   support  OTPs.  You  should  use  an  addiIonal  password! One  Time  Passwords • Two  different  One  Time  Password  standards  are  supported:  event-­‐based   HOTP  and  Yubikey-­‐style  OTPs. • HOTP  is  a  be^er  known  standard,  but  it  is  more  limited  due  to  usability   concerns  (smaller  OTP,  sync  issues,  etc.). • The  Yubikey  OTP  standard  leverages  the  fact  that  the  Yubikey  inputs  the   OTPs  for  you. Two  slots • Short-­‐press  for  slot  1;  Long-­‐press  for  slot  2  (3  secs); Drivers • Any  OS  with  USB-­‐keyboard  support.  It  even  works  during  boot  (useful  for,   e.g.,  whole-­‐disk  encrypIon  soluIons  such  as  PGP-­‐WDE  and  TrueCrypt). SAPO  Websecurity  Team 25
  • 26. Two-Factor Auth > Yubikey > Where does it work? Lastpass  (h^p://www.lastpass.com) SAPO  Websecurity  Team 26
  • 27. Two-Factor Auth > Yubikey > Where does it work? Yubico  OpenID  (h^p://openid.yubico.com) SAPO  Websecurity  Team 27
  • 28. Yubikey > Where does it work? FastMail  (h^p://www.fastmail.fm) SAPO  Websecurity  Team 28
  • 29. Two-Factor Auth > Yubikey > Where does it work? Laptop    (h^p://127.0.0.1) One  Time  Password Sta&c  Password SAPO  Websecurity  Team 29
  • 30. Yubikey > Where could it work? Architecture SAPO  Websecurity  Team 30
  • 31. Two-Factor Auth > Yubikey > Details Inner  workings  (Protocol  spec  is  Open) SAPO  Websecurity  Team 31
  • 32. Two-Factor Auth > Yubikey > Security Threats Protocol  a^acks • Generated  OTPs  consist  of  unique  128  bit  blocks  encrypted  with  a  shared   AES  key  between  Token  and  Server.  Protocol  security  depends  on  the   security  strength  of  the  AES  algorithm. SAPO  Websecurity  Team 32
  • 33. Two-Factor Auth > Yubikey > Security Threats Server  a^acks • Central  authenIcaIon  servers  store  symmetric  keys  for  all  Tokens.  If  successfully   a^acked,  this  can  be  catastrophic.  Yubico  miIgates  this  with  tamper-­‐proof  HSMs.   • A  DoS  a^ack  on  the  server  will  result  in  users  not  being  able  to  log  in. SAPO  Websecurity  Team 33
  • 34. Two-Factor Auth > Yubikey > Security Threats User  a^acks • Social  engineering; • Phishing; • “Borrowing”  the  Token. SAPO  Websecurity  Team 34
  • 35. Two-Factor Auth > Yubikey > Security Threats Host  a^acks • Soeware  key  extracIon  (very  hard  to  exploit); • Man-­‐in-­‐the-­‐browser. SAPO  Websecurity  Team 35
  • 36. Two-Factor Auth > Yubikey > Security Threats Hardware  a^acks • Hardware  key  extracIon  and  Token  duplicaIon. SAPO  Websecurity  Team 36
  • 37. Two-Factor Auth > Yubikey > Advantages Convenient • No  drivers  necessary • Types  the  key  for  you Open • Open  standard  and  infrastructure • Soeware  released  under  permissive  license • Extensible  (PIN  opIon) • No  license  required  per  token Affordable • Around  10€  if  purchased  in  larger  quanIIes Secure • Provides  an  addiIonal  authenIcaIon  factor • OTP  generaIon  requires  manual  intervenIon SAPO  Websecurity  Team 37
  • 38. Two-Factor Auth > NFC/RFID NFC/RFID We  can  use  the  technology  for  many  purposes,  including  authen&ca&on Pros: • Could  be  very  convenient • No  need  to  carry[/buy]  extra  devices  (your   mobile  phone  is  always  with  you) Cons: • The  security  aspects  are  s&ll  being  discussed.   (Mifare  1K  and  DESFire  tags  can  be  cloned) • In  reality,  there  are  no  standard  mechanisms  on   devices  to  use  NFC  authen&ca&on. SAPO  Websecurity  Team 38
  • 39. Trends > PoC SAPO  Websecurity  Team 39
  • 40. Future Trends SAPO  Websecurity  Team 40
  • 41. Trends Two-­‐factor  AuthenLcaLon  is  gecng  Popular: SAPO  Websecurity  Team 41
  • 42. Future QR  Codes Some  interesLng  ideas  are  brewing... SAPO  Websecurity  Team 42
  • 43. Trends > BMWʼs NFC PoC SAPO  Websecurity  Team 43
  • 44. Links Smart  Cards • OpenSC  Project  -­‐  h^p://www.opensc-­‐project.org Yubikeys • Yubico  -­‐  h^p://www.yubico.com Time-­‐based  and  event-­‐based  OTPs • Google  AuthenIcator  -­‐  h^p://code.google.com/p/google-­‐authenIcator/ NFC • libnfc-­‐  h^p://www.libnfc.org/documentaIon/introducIon QR  Codes • Iqr  -­‐  hYps://&qr.org/ Biometrics • BioAPI  Consor&um  -­‐  hYp://www.bioapi.org/ SAPO  Websecurity  Team 44
  • 45. The End QuesLons? Nuno  Loureiro  <nuno@co.sapo.pt> João  Poupino  <joao.poupino@co.sapo.pt> SAPO  Websecurity  Team 45