Practical, Usable, and Secure Authentication and Authorization on the Web

dc.contributor.advisorKohno, Tadayoshien_US
dc.contributor.authorCzeskis, Alexeien_US
dc.date.accessioned2013-11-14T20:53:03Z
dc.date.available2013-11-14T20:53:03Z
dc.date.issued2013-11-14
dc.date.submitted2013en_US
dc.descriptionThesis (Ph.D.)--University of Washington, 2013en_US
dc.description.abstractUser authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are achieved through the use of decade-old techniques that are both often inconvenient for users and have been shown to be insecure against practical attackers. Many approaches have been proposed and attempted to improve and strengthen user authentication and authorization. Among them are authentication schemes that use hardware tokens, graphical passwords, one-time-passcode generators, and many more. Similarly, a number of approaches have been proposed to change how user authorization is performed. Unfortunately, none of the new approaches have been able to displace the traditional authentication and authorization strategies on the web. Meanwhile, attacks against user authentication and authorization continue to be rampant and are often (due to the lack of progress in practical defenses) successful. This dissertation examines the existing challenges to providing secure, private, and usable user authentication and authorization on the web. We begin by analyzing previous approaches with the goal of fundamentally understanding why and how previous solutions have not been adopted. Second, using this insight, we present three systems, each aiming to improve an aspect of user authentication and authorization on the web. <italic>Origin-Bound Certificates</italic> provide a deployable and secure building block for user credential transfer on the web. <italic>PhoneAuth</italic> uses Origin-Bound Certificates in order to allow users to securely authenticate to service providers in the face of strong attackers while maintaining the traditional username/password authentication model. Finally, <italic>Allowed Referrer Lists</italic> allow developers to easily protect applications against authorization vulnerabilities. We present the design, implementation, and evaluation for each of the three systems, demonstrating the feasibility of our approaches. Together, these works advance the state of the art in practical, usable and secure user authentication and authorization on the web. These systems demonstrate that through deep consideration of fundamental stakeholder values and careful engineering, it is possible to build systems that increase the security of user authentication and authorization without adversely impacting the user and developer experiences, while at the same time being deployable and practical.en_US
dc.embargo.termsNo embargoen_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.otherCzeskis_washington_0250E_12273.pdfen_US
dc.identifier.urihttp://hdl.handle.net/1773/24133
dc.language.isoen_USen_US
dc.rightsCopyright is held by the individual authors.en_US
dc.subjectauthentication; internet; privacy; security; weben_US
dc.subject.otherComputer scienceen_US
dc.subject.othercomputer science and engineeringen_US
dc.titlePractical, Usable, and Secure Authentication and Authorization on the Weben_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Czeskis_washington_0250E_12273.pdf
Size:
1.37 MB
Format:
Adobe Portable Document Format