期刊文献+

Implementation of a TPM-Based Security Enhanced Browser Password Manager 被引量:1

Implementation of a TPM-Based Security Enhanced Browser Password Manager
原文传递
导出
摘要 In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable. In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.
机构地区 School of Information
出处 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期56-62,共7页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61472429,61070192,91018008,61303074,61170240) the Beijing Municipal Natural Science Foundation(4122041) National High-Technology Research and Development Program of China(863 Program)(2007AA01Z414)
关键词 trusted platform module(TPM) password manager trusted encryption decryption trusted platform module(TPM) password manager trusted encryption decryption
  • 相关文献

参考文献1

二级参考文献13

  • 1Ross B, Jackson C, Miyake N, et al. Stronger password authentication using browser extensions[C]//Proceedings of the 14th USENIX Security Symposium. California: USENIX Association Berkeley, 2005: 17-32.
  • 2Halderman J A, Waters B, Felten E W. A convenient method for securely managing passwords [ C ]//Proceedings of the 14th International Conference on World Wide Web. Chiba: ACM Press, 2005:471-479.
  • 3Yee K P, Sitaker K. Passpet: convenient password management and phishing protection[C]//Proceedings of the Second Symposium on Usable Privacy and Security. New York: ACM, 2006: 32-43.
  • 4Trusted Computing Group. TCG specification architecture overview specification [ EB/OL ]. [ 2007-08-02 ]. http://www, trustedcomputinggroup, org.
  • 5Trusted Computing Group. TCG software stack (TSS) specification[ EB/OL]. [ 2007-03-07 ]. http: //www. trustedcomputinggroup, org.
  • 6Trusted Computing Group. TPM main part 1 design principles specification [ EB/OL]. [ 2007-07-09 ]. http: //www. trustedcomputinggroup, org.
  • 7Yan J, Blackwell A, Anderson R, et al. The memorability and security of passwords-some empirical results [ Z ]. [S. l. ] : University of Cambridge Computer Laboratory,2000.
  • 8Hamilton S S, Carlisle M C, Hamilton J A. A global look at authentication [C] // IWA' 07. New York: IEEE SMC, 2007: 1-8.
  • 9Gajek S, Sadeghi A R, Stuble C, et al. Compartmented security for browsers-or how to thwat a phisher with trusted computing [ C] // Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington D C: IEEE Computer Society, 2007: 120-127.
  • 10Me G, Pirro D, Sarrecchia R. A mobile based approach to strong authentication on web[ C] // Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington D C: IEEE Computer Society, 2006: 67-67.

共引文献3

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部