Abstract
Most visual code authentication schemes in the literature have been shown to be vulnerable to relay attacks: the attacker logs into the victim’s “account A” using credentials that the victim provides with the intent of logging into “account B”. Visual codes are not human-readable and therefore the victim cannot distinguish between the codes for A and B; on the other hand, codes must be machine-readable in order to automate the login process. We introduce a new type of visual code, the SAVVIcode, that contains an integrity-validated human-readable bitmap. With SAVVIcode, attackers have a harder time swapping visual codes surreptitiously because the integrity check prevents them from modifying or hiding the human-readable distinguisher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Another mechanism used to improve the scanning accuracy of visual codes is to use encodings that break up large contiguous blocks of the same colour. The SAVVIcode does not use this method for resynchronisation because we want the bitmap to be immediately readable, even without meaning to, by the person scanning the code. We thus want a high-contrast bitmap in which the black ink stands out against a background of white space.
References
Batyuk, L., Camtepe, S.A., Albayrak, S.: Multi-device key management using visual side channels in pervasive computing environments. Proc. BWCCA 2011, 207–214 (2011)
Cobos, J.J.L., De La Hoz, P.C.: Method and system for authenticating a user by means of a mobile device. US Patent 8,261,089, 4 September 2012
Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21–39. Springer, Heidelberg (1988)
DeSoto, D.B., Peskin, M.A.: Login using QR code, US Patent Application 13/768,336, 22 August 2013
Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, consumer-friendly web authentication and payments with a phone. In: Gris, M., Yang, G. (eds.) MobiCASE 2010. LNICST, vol. 76, pp. 17–38. Springer, Heidelberg (2012)
Gibson, S.: Secure quick reliable login. https://www.grc.com/sqrl/sqrl.htm
Jenkinson, G., Spencer, M., Warrington, C., Stajano, F.: I bought a new security token and all I got was this lousy phish—relay attacks on visual code authentication schemes. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 197–215. Springer, Heidelberg (2014)
Millican, J.: Implementing Pico authentication for linux. Undergraduate Final Year Dissertation, May 2014
Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011)
Van Rijswijk, R.M., Van Dijk, J.: Tiqr: a novel take on two-factor authentication. In: Proceedings of LISA 2011, p. 7. USENIX Association (2011)
Acknowledgements
We are grateful to the Pico team for their feedback and to Andy Rice for helpful discussions on visual code scanning technology.
The Pico team is also working on an alternative “augmented reality” approach in which the human-readable tag is displayed by the scanner rather than being shown alongside the visual tag.
The second author is partly supported by European Research Council grant 307224 (Pico).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Millican, J., Stajano, F. (2015). SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper). In: Mjølsnes, S. (eds) Technology and Practice of Passwords. PASSWORDS 2014. Lecture Notes in Computer Science(), vol 9393. Springer, Cham. https://doi.org/10.1007/978-3-319-24192-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-24192-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24191-3
Online ISBN: 978-3-319-24192-0
eBook Packages: Computer ScienceComputer Science (R0)