Computer Security and Cryptography Reading Group
November 2005 List

Date &
Location
Reading
Thursday, November 10, 2005
3 PM - 4 PM
7331 CS

T. Wobber
M. Abadi, A. Birrell, T. Wobber
UCSC / MSR
Access Control in a World of Software Diversity
HotOS X

URL: http://research.microsoft.com/research/sv/sv-pubs/AccessControlWithDiversity.pdf

We describe a new design for authentication and access control. In this design, principals embody a flexible notion of authentication. They are compound principals that reflect the identities of the programs that have executed, even those of login programs. These identities are based on a naming tree. Our access control lists are patterns that recognize principals. We show how this design supports a variety of access control scenarios.



M. Krohn

P. Efstathopoulos

F. Kaashoek

E. Kohler

R. Morris
M. Krohn, P. Efstathopoulos, C. Frey, F. Kaashoek, E. Kohler, D. Mazières, R. Morris, M. Osborne, S. VanDeBogart, D. Ziegler
MIT / UCLA / NYU
Make Least Privilege a Right (Not a Privilege)
HotOS X

URL: http://pdos.csail.mit.edu/papers/asbestos-hotos05.pdf

Though system security would benefit if programmers routinely followed the principle of least privilege, the interfaces exposed by operating systems often stand in the way. We investigate why modern OSes thwart secure programming practices and propose solutions.

Thursday, November 17, 2005
3 PM - 4 PM
7331 CS
A. Narayanan, V. Shmatikov
UTA
Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff
CCS 2005

URL: http://www.cs.utexas.edu/~shmat/shmat_ccs05pwd.pdf

Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special characters. We demonstrate that as long as passwords remain human-memorable, they are vulnerable to "smart-dictionary" attacks even when the space of potential passwords is large.

Our first insight is that the distribution of letters in easy-to-remember passwords is likely to be similar to the distribution of letters in the users' native language. Using standard Markov modeling techniques from natural language processing, this can be used to dramatically reduce the size of the password space to be searched. Our second contribution is an algorithm for efficient enumeration of the remaining password space. This allows application of time-space tradeoff techniques, limiting memory accesses to a relatively small table of "partial dictionary" sizes and enabling a very fast dictionary attack.

We evaluated our method on a database of real-world user password hashes. Our algorithm successfully recovered 67.6% of the passwords using a 2 x 10^9 search space. This is a much higher percentage than Oechslin's "rainbow" attack, which is the fastest currently known technique for searching large keyspaces. These results call into question viability of human-memorable character-sequence passwords as an authentication mechanism.


< Back to the Sec & Crypto reading group page
Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Fri Feb 04 16:32:13 2005
Last modified: Fri Sep 30 13:59:39 Central Daylight Time 2005