Usable Authentication Ceremonies in Secure Instant Messaging
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Empirical Survey on How Much Security and Privacy Customers Want in Instant Messengers
SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers Thomas Paul Hans-Joachim Hof MuSe – Munich IT Security Research Group Munich University of Applied Sciences Munich University of Applied Sciences Lothstrasse 64, Munich, Germany Lothstraße 64, Munich, Germany e-mail: [email protected] e-mail: [email protected] Abstract— Instant messengers are popular communication developers of future instant messengers to decide on tools used by many people for everyday communication, as security features to implement. well as for work related communication. Following the This paper is structured as follows: Section II discusses disclosure of a massive surveillance system by Edward related work. Section III presents the design of the user Snowden, many users became aware of the risks of unsecure survey. Section IV discusses in detail the findings of the communication. Users increasingly ask for secure communication. However, unsecure instant messengers are still user survey. Section V presents the features of an ideal popular nowadays. This could be due to the fact, that, besides instant messenger fulfilling all the user preferences the large number of available instant messengers, no instant identified by the survey. A market simulation is used to messenger fully satisfies the users preferences. To research the show the potential of this ideal instant messenger. Section acceptance of security mechanisms in instant messengers, this VI summarizes the findings of the paper. paper presents an evaluation of user preferences for secure instant messengers. A user survey was conducted to rate the II. -
Secure Messaging1
SoK: Secure Messaging1 Nik Unger∗, Sergej Dechandy Joseph Bonneauzx, Sascha Fahl{, Henning Perl{ Ian Goldberg∗, Matthew Smithy ∗ University of Waterloo, y University of Bonn, z Stanford University, x Electronic Frontier Foundation, { Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state of this paper, the academic research community is also failing surveillance of personal communication, many solutions now to learn some lessons from tools in the wild. claim to offer secure and private messaging. This includes both a Furthermore, there is a lack of coherent vision for the future large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two of secure messaging. Most solutions focus on specific issues years to deliver solutions quickly has resulted in varying threat and have different goals and threat models. This is com- models, incomplete objectives, dubious security claims, and a lack pounded by differing security vocabularies and the absence of of broad perspective on the existing cryptographic literature on a unified evaluation of prior work. Outside of academia, many secure communication. products mislead users by advertising with grandiose claims In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for of “military grade encryption” or by promising impossible their security, usability, and ease-of-adoption properties. We con- features such as self-destructing messages [7]–[10]. The recent sider solutions from academia, but also identify innovative and EFF Secure Messaging Scorecard evaluated tools for basic promising approaches used “in-the-wild” that are not considered indicators of security and project health [11] and found many by the academic literature. -
Multi-Device Secure Instant Messaging
SoK: Multi-Device Secure Instant Messaging Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz {antonio.dimeo, felix.gohla, daniel.gossen, niko.lockenvitz}@student.hpi.de Hasso Plattner Institute, University of Potsdam April 17, 2021 Abstract The secure multi-device instant messaging ecosystem is diverse, varied, and under- represented in academia. We create a systematization of knowledge which focuses on the challenges of multi-device messaging in a secure context and give an overview of the current situation in the multi-device setting. For that, we analyze messenger documentation, white papers, and research that deals with multi-device messaging. This includes a detailed description of different patterns for data transfer between devices as well as device management, i.e. how clients are cryptographically linked or unlinked to or from an account and how the initial setup can be implemented. We then evaluate different instant messengers with regard to relevant criteria, e.g. whether they achieve specific security, usability, and privacy goals. In the end, we outline interesting areas for future research. Contents 1 Introduction3 1.1 Group Messaging vs. Multi-Device Messaging............... 4 1.2 Methodology.................................. 4 2 Multi-Device Messaging7 2.1 Context...................................... 7 2.2 Transferring Data Between Different Devices of One User........ 7 2.2.1 Storing Data on a Server........................ 8 2.2.2 Using Messages to Exchange Data.................. 9 2.3 Transferring Data to a Different User..................... 11 2.3.1 Without End-to-end Encryption................... 11 2.3.2 End-to-end Encryption With Shared Group Key.......... 13 2.3.3 End-to-end Encryption Per Recipient............... -
Expert and Non-Expert Attitudes Towards (Secure) Instant Messaging
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging Alexander De Luca, Google; Sauvik Das, Carnegie Mellon University; Martin Ortlieb, Iulia Ion, and Ben Laurie, Google https://www.usenix.org/conference/soups2016/technical-sessions/presentation/deluca This paper is included in the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). June 22–24, 2016 • Denver, CO, USA ISBN 978-1-931971-31-7 Open access to the Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) is sponsored by USENIX. Expert and Non-Expert Attitudes towards (Secure) Instant Messaging Alexander De Luca1, Sauvik Das2, Martin Ortlieb1, Iulia Ion1, Ben Laurie1 1Google; 2Carnegie Mellon University, Pittsburgh, United States {adeluca,mortlieb,iuliaion,benl}@google.com,[email protected] ABSTRACT curity/privacy over traditional mobile IMs have entered the In this paper, we present results from an online survey with app market. However, there are, as yet, few insights about 1,510 participants and an interview study with 31 partici- how and why users do or do not use these messengers. pants on (secure) mobile instant messaging. Our goal was To bridge this gap in the literature, we performed two stud- to uncover how much of a role security and privacy played ies – an online survey with 1,510 participants and a set of in- in people’s decisions to use a mobile instant messenger. In person interviews with 31 participants. For the interviews, the interview study, we recruited a balanced sample of IT- we recruited a balanced sample of people from the general security experts and non-experts, as well as an equal split public and IT security experts. -
Secure Messaging1
SoK: Secure Messaging1 Nik Unger∗, Sergej Dechandy Joseph Bonneauzx, Sascha Fahl{, Henning Perl{ Ian Goldberg∗, Matthew Smithy ∗ University of Waterloo, y University of Bonn, z Stanford University, x Electronic Frontier Foundation, { Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state insecure ways. However, as will become clear over the course surveillance of personal communication, many solutions now of this paper, the academic research community is also failing claim to offer secure and private messaging. This includes both a to learn some lessons from tools in the wild. large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two Furthermore, there is a lack of coherent vision for the future years to deliver solutions quickly has resulted in varying threat of secure messaging. Most solutions focus on specific issues models, incomplete objectives, dubious security claims, and a lack and have different goals and threat models. This is com- of broad perspective on the existing cryptographic literature on pounded by differing security vocabularies and the absence of secure communication. a unified evaluation of prior work. Outside of academia, many In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for products mislead users by advertising with grandiose claims their security, usability, and ease-of-adoption properties. We con- of “military grade encryption” or by promising impossible sider solutions from academia, but also identify innovative and features such as self-destructing messages [7]–[10]. The recent promising approaches used “in-the-wild” that are not considered EFF Secure Messaging Scorecard evaluated tools for basic by the academic literature. -
Forensic Analysis of the Chatsecure Instant Messaging Application on Android Smartphones
Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones Please, cite this paper as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones," Digital Investigation, Volume 19, December 2016, Pages 44{59. DOI:10.1016/j.diin.2016.10.001 Publisher: http://dx.doi.org/10.1016/j.diin.2016.10.001 1 Forensic Analysis of the ChatSecure Instant Messaging Application on Android SmartphonesI,II Cosimo Anglanoa,∗, Massimo Canonicoa, Marco Guazzonea (Please, cite as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones," Digital Investigation, Volume 19, December 2016, Pages 44{59. DOI: 10.1016/j.diin.2016.10.001) aDiSIT - Computer Science Institute, University of Piemonte Orientale, Alessandria (Italy) Abstract We present the forensic analysis of the artifacts generated on Android smart- phones by ChatSecure, a secure Instant Messaging application that provides strong encryption for transmitted and locally-stored data to ensure the pri- vacy of its users. We show that ChatSecure stores local copies of both exchanged messages and files into two distinct, AES-256 encrypted databases, and we devise a technique able to decrypt them when the secret passphrase, chosen by the user as the initial step of the encryption process, is known. Furthermore, we show how this passphrase can be identified and extracted from the volatile memory of the device, where it persists for the entire execu- tion of ChatSecure after having been entered by the user, thus allowing one IPlease, cite as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Foren- sic Analysis of the ChatSecure Instant Messaging Application on Android Smart- phones," Digital Investigation, Volume 19, December 2016, Pages 44{59, DOI: 10.1016/j.diin.2016.10.001 IILink to publisher: http://dx.doi.org/10.1016/j.diin.2016.10.001 ∗Corresponding author. -
Deniable Key Exchanges for Secure Messaging
Deniable Key Exchanges for Secure Messaging by Nik Unger A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer Science Waterloo, Ontario, Canada, 2015 Nik Unger 2015 Some rights reserved. BY NC SA This thesis consists of material all of which I authored or co-authored: see Statement of Contributions included in the thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. License This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons. org/licenses/by-nc-sa/4.0/. ii Statement of Contributions The content in Chapter 2 of this thesis was co-authored with Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and Matthew Smith. In particular, the expert usability reviews were performed by Sergej Dechand, Sascha Fahl, Henning Perl, and Matthew Smith, and the figures in Chapter 2 were produced by Sergej Dechand. All other chapters in this thesis contain original work authored under the supervision of Ian Goldberg. iii Abstract Despite our increasing reliance on digital communication, much of our online discourse lacks any security or privacy protections. Almost no email messages sent today provide end-to-end security, despite privacy-enhancing technologies being available for decades. Recent revelations by Edward Snowden of government surveillance have highlighted this disconnect between the importance of our digital communications and the lack of available secure messaging tools. -
Pets Controls Matrix: a Systematic Approach for Assessing Online and Mobile Privacy Tools Final Report | Public | DECEMBER 2016
PETs controls matrix A systematic approach for assessing online and mobile privacy tools FINAL REPORT PUBLIC DECEMBER 2016 www.enisa.europa.eu European Union Agency For Network And Information Security PETs controls matrix: A systematic approach for assessing online and mobile privacy tools Final report | Public | DECEMBER 2016 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact For contacting the authors please use [email protected] For media enquiries about this paper, please use [email protected]. Acknowledgements We would like to thank Claude Castelluccia (INRIA) for his support and advice throughout this project. We would also like to thank Rolf Wendolsky (JonDos) and Meiko Jensen (FH Kiel) for their comments and suggestions. Legal notice Notice must be taken that this publication represents the views and interpretations of the authors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the Regulation (EU) No 526/2013. -
Secure Messaging1
2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 Nik Unger∗, Sergej Dechand† Joseph Bonneau‡§, Sascha Fahl¶, Henning Perl¶ Ian Goldberg∗, Matthew Smith† ∗ University of Waterloo, † University of Bonn, ‡ Stanford University, § Electronic Frontier Foundation, ¶ Fraunhofer FKIE Abstract—Motivated by recent revelations of widespread state of this paper, the academic research community is also failing surveillance of personal communication, many solutions now to learn some lessons from tools in the wild. claim to offer secure and private messaging. This includes both a Furthermore, there is a lack of coherent vision for the future large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two of secure messaging. Most solutions focus on specific issues years to deliver solutions quickly has resulted in varying threat and have different goals and threat models. This is com- models, incomplete objectives, dubious security claims, and a lack pounded by differing security vocabularies and the absence of of broad perspective on the existing cryptographic literature on a unified evaluation of prior work. Outside of academia, many secure communication. products mislead users by advertising with grandiose claims In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for of “military grade encryption” or by promising impossible their security, usability, and ease-of-adoption properties. We con- features such as self-destructing messages [7]–[10]. The recent sider solutions from academia, but also identify innovative and EFF Secure Messaging Scorecard evaluated tools for basic promising approaches used “in-the-wild” that are not considered indicators of security and project health [11] and found many by the academic literature. -
User Attitudes Toward Encrypted Messaging Apps
Omer Akgul*, Ruba Abu-Salma, Wei Bai, Michelle L. Mazurek, Elissa M. Redmiles, and Blase Ur Secrecy, Flagging, and Paranoia Revisited: User Attitudes Toward Encrypted Messaging Apps Abstract: With the popularity of tools like WhatsApp, portant usability challenge in encryption, key manage- end-to-end encryption (E2EE) is more widely available ment, by leveraging centralized key-directory services. than ever before. Nonetheless, user perceptions lag be- Building encryption into tools that are already popular, hind. Users often do not understand E2EE’s security rather than requiring users download security-specific properties or believe them sufficient. Thus, even users tools, has also mitigated some adoption challenges. with access to E2EE tools turn to less-secure alterna- Nonetheless, this newfound encryption for the tives for sending confidential information. To better un- masses has not been a panacea for security. Users of- derstand these issues, we conducted a 357-participant ten do not realize that their messages are end-to-end online user study analyzing how explanations of en- encrypted, do not understand the security properties cryption impact user perceptions. We showed partici- this implies, or do not trust that this security is suffi- pants an app-store-style description of a messaging tool, cient [6, 14, 23]. As a result, even when users already varying the terminology used, whether encryption was use an E2EE communication tool, many will turn to on by default, and the prominence of encryption. We less-secure alternatives like e-mail and SMS when they collected perceptions of the tool’s security guarantees, need to send confidential information [5, 23]. -
Forensic Analysis of the Chatsecure Instant Messaging Application on Android Smartphones
Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones Please, cite this paper as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones," Digital Investigation, Volume 19, December 2016, Pages 44{59. DOI:10.1016/j.diin.2016.10.001 Publisher: http://dx.doi.org/10.1016/j.diin.2016.10.001 arXiv:1610.06721v1 [cs.CR] 21 Oct 2016 1 Forensic Analysis of the ChatSecure Instant Messaging Application on Android SmartphonesI,II Cosimo Anglanoa,∗, Massimo Canonicoa, Marco Guazzonea (Please, cite as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones," Digital Investigation, Volume 19, December 2016, Pages 44{59. DOI: 10.1016/j.diin.2016.10.001) aDiSIT - Computer Science Institute, University of Piemonte Orientale, Alessandria (Italy) Abstract We present the forensic analysis of the artifacts generated on Android smart- phones by ChatSecure, a secure Instant Messaging application that provides strong encryption for transmitted and locally-stored data to ensure the pri- vacy of its users. We show that ChatSecure stores local copies of both exchanged messages and files into two distinct, AES-256 encrypted databases, and we devise a technique able to decrypt them when the secret passphrase, chosen by the user as the initial step of the encryption process, is known. Furthermore, we show how this passphrase can be identified and extracted from the volatile memory of the device, where it persists for the entire execu- tion of ChatSecure after having been entered by the user, thus allowing one IPlease, cite as: Cosimo Anglano, Massimo Canonico, Marco Guazzone, \Foren- sic Analysis of the ChatSecure Instant Messaging Application on Android Smart- phones," Digital Investigation, Volume 19, December 2016, Pages 44{59, DOI: 10.1016/j.diin.2016.10.001 IILink to publisher: http://dx.doi.org/10.1016/j.diin.2016.10.001 ∗Corresponding author. -
Encrypted Network Traffic Analysis of Secure Instant Messaging Application
applied sciences Article Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App Asmara Afzal 1, Mehdi Hussain 1,*, Shahzad Saleem 1,2, M. Khuram Shahzad 1, Anthony T. S. Ho 3,4 and Ki-Hyun Jung 5,* 1 Department of Computing, School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan; [email protected] (A.A.); [email protected] (S.S.); [email protected] (M.K.S.) 2 Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah 23218, Saudi Arabia 3 Department of Computer Science, University of Surrey, Guildford GU27XH, UK; [email protected] 4 Department of Computer Science and Technology, Tianjin University of Science and Technology, Tianjin 300222, China 5 Department of Cyber Security, Kyungil University, Gyeongbuk 38424, Korea * Correspondence: [email protected] (M.H.); [email protected] (K.-H.J.) Abstract: Instant messaging applications (apps) have played a vital role in online interaction, es- pecially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the Citation: Afzal, A.; Hussain, M.; potential artifacts from the encrypted network traffic of the prominent social messenger app Signal Saleem, S.; Shahzad, M.K.; Ho, A.T.S.; (on Android version 9).