SlideShare a Scribd company logo
Threat Modeling Authentication
Kelley Robinson | BSides PDX 2018
BSides PDX - Threat Modeling Authentication
Vertex-based
Elliptic Cryptography
on N-way
Bojangle SpacesPasswords
🤷
Simple Complex
@kelleyrobinson
“How can we help users avoid harm?
This begins with a clear understanding
of the actual harms they face, and a
realistic understanding of their
constraints.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
Threat Modeling Authentication
Kelley Robinson
@kelleyrobinson
☎🔐👋 %
@kelleyrobinson
https://www.owasp.org/index.php/Application_Threat_Modeling
🔐 What are we going to do about that?
✅ Did we do a good job?
🚩 What can go wrong?
Application Threat Modeling
🏗 What are we building?
@kelleyrobinson
🏗 What are we building?
💰
💰
💰
@kelleyrobinson
1. Your users have
something of value
connected to an
account
*
+
,
Assumptions
@kelleyrobinson
*
+
,
2. A user can only
access the value
once they are
authenticated
Assumptions
💰
💰
💰
@kelleyrobinson
💰
💰
💰
*
+
,
3. A successful
impersonator could
also access that
value
Assumptions
How
common
is this?
@kelleyrobinson
💰$5.1B💰
In 2017
@kelleyrobinson
@kelleyrobinson
https://xkcd.com/1121/
Physical Identities
• Face
• Voice
• Fingerprints
Contextual Identities
• Email address
• Phone number
• Names and usernames
Government Identities
• Driver license
• Social security card
• Birth certificate
@kelleyrobinson
@kelleyrobinson
Physical Identities
• Most trustworthy
• Practically impossible to change
@kelleyrobinson
Government Identities
• Very trustworthy
• Usually physical
• Difficult to change
@kelleyrobinson
Contextual Identities
• Not 1:1 relationship
• Easier to change
Why is identity
management hard?
• Imperfect systems
• We may never know if we
got it right
• Trust waterfalls
@kelleyrobinson
🚩 What can go wrong?
@kelleyrobinson
“It is mainly time, and not money, that
users risk losing when attacked. It is also
time that security advice asks of them.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Think about average case
instead of worst case.
@kelleyrobinson
1. Compromised factors
(hacked, guessed, or brute forced)
2. Phishing or vishing
🚩 What can go wrong?
https://www.nds.rub.de/media/ei/veroeffentlichungen/2017/01/13/OIDCSecurity_1.pdf
https://tools.ietf.org/html/rfc6819
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
☎ Requests via contact center
• Vishing
• Humans are fallible
@kelleyrobinson
↩ Account recovery
• How strict do you want to make it?
• Password resets, security questions,
backup codes...
@kelleyrobinson
Account value
Likelihoodofbeingatarget
Very Official
Risk Assessment
@kelleyrobinson
Money
Information
Control
Power
Account value*
Likelihoodofbeingatarget
@kelleyrobinson
🔐 What are we going to do?
@kelleyrobinson
“We must prioritize advice...Since users
cannot do everything, they must select
which advice they will follow and will
ignore.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Single Sign-on 🤷
Authentication Factors
• Something you know
• Something you have
• Something you are
@kelleyrobinson
@kelleyrobinson
@kelleyrobinson
Something you know: Passwords
https://blog.github.com/2018-07-31-new-improvements-and-best-practices-for-account-security-and-recoverability/
https://www.twilio.com/blog/2018/06/round-up-libraries-for-checking-pwned-passwords-in-your-7-favorite-languages.html
@kelleyrobinson
Multi Factor Authentication
• SMS / Voice
• TOTP
• Push
• Yubikey
@kelleyrobinson
How to drive adoption of MFA
• Profile settings
• Prompt during onboarding
• Have an ICO
40% adoption
100% adoption
2% adoption
SMS 2FA is still
better than
no 2FA
@kelleyrobinson
“When we exaggerate all dangers we
simply train users to ignore us.
@kelleyrobinson
Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
”
Employees*
Moderators
Everyone else
Potential Reddit 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
*might be managed by IT, not dev
Balance over $250k
Balance over $10k
Everyone else
Potential Banking 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
Verified accounts
Over 1,000 followers
Everyone else
Potential Twitter 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
https://twitter.com/patio11/status/1053205207964823552
☎
Requests
via contact
center
@kelleyrobinson
↩ Account recovery
• Use authentication factors instead of identity
(i.e. pin code instead of SSN)
• Use security questions that aren't fact based
(unavailable via OSINT)
http://goodsecurityquestions.com/examples/
@kelleyrobinson
✅ Did we do a good job?
@kelleyrobinson
ℹ Support costs relative to losses ⬇
💰 Losses due to account takeover ⬇
😈 Number of compromised accounts ⬇
😃 Customer satisfaction ⬆
@kelleyrobinson
“Security people are full of morbid and
detailed monologues about the pervasive
catastrophes that surround us.
”James Mickens, This World of Ours
@kelleyrobinson
"I dared two expert hackers to destroy my life. Here's what happened."
@kelleyrobinson
Don't blame users
for bad passwords.
It's our responsibility to protect them.
@kelleyrobinson
THANK YOU!
@kelleyrobinson

More Related Content

DOCX
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PPTX
Authentication and session v4
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PDF
Authentication Beyond SMS
PDF
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
PDF
Multi Factor Authetification - ZendCon 2017
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
The Why - Keith Graham, CTO – SecureAuth+Core Security
Authentication and session v4
OWASP Top 10 Proactive Control 2016 (C5-C10)
Authentication Beyond SMS
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
Multi Factor Authetification - ZendCon 2017

Similar to BSides PDX - Threat Modeling Authentication (20)

PDF
Solving problems with authentication
PPTX
CI-ISSA '23 - Bad Multi-Factor
PPTX
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
PDF
How to Find and Fix Broken Authentication Vulnerability
PDF
Getting authentication right
PDF
The life of breached data and the attack lifecycle
PDF
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
PPT
Security audit
PPT
Security Audit
PPTX
Broken Authentication and Authorization(1).pptx
PDF
Contact Center Authentication
PDF
2020-08_The_Evolution_of_Authentication.pdf
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
Security for Data Scientists
PDF
Auth on the web: better authentication
PDF
What is Authentication in Network Security| Digitdefence
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PDF
Designing customer account recovery in a 2FA world
DOCX
ISOL536 Security Architecture and DesignDr. Justin O. .docx
Solving problems with authentication
CI-ISSA '23 - Bad Multi-Factor
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Taking Control of the Digital and Mobile User Authentication Challenge
 
How to Find and Fix Broken Authentication Vulnerability
Getting authentication right
The life of breached data and the attack lifecycle
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Security audit
Security Audit
Broken Authentication and Authorization(1).pptx
Contact Center Authentication
2020-08_The_Evolution_of_Authentication.pdf
Webinar: Goodbye RSA. Hello Modern Authentication.
Security for Data Scientists
Auth on the web: better authentication
What is Authentication in Network Security| Digitdefence
05 application security fundamentals - part 2 - security mechanisms - autho...
Designing customer account recovery in a 2FA world
ISOL536 Security Architecture and DesignDr. Justin O. .docx
Ad

More from Kelley Robinson (20)

PDF
Protecting your phone verification flow from fraud & abuse
PDF
Preventing phone verification fraud (SMS pumping)
PDF
WebAuthn
PDF
Introduction to Public Key Cryptography
PDF
2FA in 2020 and Beyond
PDF
Identiverse 2020 - Account Recovery with 2FA
PDF
Introduction to SHAKEN/STIR
PDF
Intro to SHAKEN/STIR
PDF
PSD2, SCA, WTF?
PDF
Building a Better Scala Community
PDF
BSides SF - Contact Center Authentication
PDF
Communication @ Startups
PDF
SIGNAL - Practical Cryptography
PDF
2FA Best Practices
PDF
Practical Cryptography
PDF
2FA, WTF!?
PDF
PDF
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
PDF
Analyzing Pwned Passwords with Spark and Scala
PDF
Practical Cryptography
Protecting your phone verification flow from fraud & abuse
Preventing phone verification fraud (SMS pumping)
WebAuthn
Introduction to Public Key Cryptography
2FA in 2020 and Beyond
Identiverse 2020 - Account Recovery with 2FA
Introduction to SHAKEN/STIR
Intro to SHAKEN/STIR
PSD2, SCA, WTF?
Building a Better Scala Community
BSides SF - Contact Center Authentication
Communication @ Startups
SIGNAL - Practical Cryptography
2FA Best Practices
Practical Cryptography
2FA, WTF!?
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark and Scala
Practical Cryptography
Ad

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Current and future trends in Computer Vision.pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Fundamentals of Mechanical Engineering.pptx
PPT
Project quality management in manufacturing
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPT on Performance Review to get promotions
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Current and future trends in Computer Vision.pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Safety Seminar civil to be ensured for safe working.
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Fundamentals of Mechanical Engineering.pptx
Project quality management in manufacturing
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF

BSides PDX - Threat Modeling Authentication