loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Henry Hosseini ; Julian Rengstorf and Thomas Hupperich

Affiliation: Department of Information Systems, University of Münster, Germany

Keyword(s): Public Key Authentication, Leakage Detection, Security Services.

Abstract: Public key authentication is widely used alternatively to password-based credentials, enabling remote login with a generated key pair consisting of a private key and a public key. Like passwords, private keys are required to remain confidential to prevent unauthorized access to resources. These secrets might become subject to theft or publicly exposed unintentionally by the key’s owner. In such cases, the keys are deemed compromised and need to be revoked and abandoned instantaneously. Unfortunately, it is rarely possible for users to know whether their secret keys have been publicly exposed. Closing this gap, we introduce a private key leakage checker titled KeyPwned crawling the Internet for exposed authentication keys. We present a continuously updated database of leaked keys’ fingerprints discovered on websites or in source code repositories. For community-driven enhancement, we allow suggestions of URLs to scan for additional leaked keys, following our standardized process. We f urthermore offer users a registration with their public keys to be notified if we detect leakage of their corresponding private key. KeyPwned is designed to run as a service following common software design standards, empowering users to verify their keys’ confidentiality and take action if a private key has been exposed. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 13.59.82.167

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Hosseini, H.; Rengstorf, J. and Hupperich, T. (2022). Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?. In Proceedings of the 17th International Conference on Software Technologies - ICSOFT; ISBN 978-989-758-588-3; ISSN 2184-2833, SciTePress, pages 649-656. DOI: 10.5220/0011308000003266

@conference{icsoft22,
author={Henry Hosseini. and Julian Rengstorf. and Thomas Hupperich.},
title={Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?},
booktitle={Proceedings of the 17th International Conference on Software Technologies - ICSOFT},
year={2022},
pages={649-656},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011308000003266},
isbn={978-989-758-588-3},
issn={2184-2833},
}

TY - CONF

JO - Proceedings of the 17th International Conference on Software Technologies - ICSOFT
TI - Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?
SN - 978-989-758-588-3
IS - 2184-2833
AU - Hosseini, H.
AU - Rengstorf, J.
AU - Hupperich, T.
PY - 2022
SP - 649
EP - 656
DO - 10.5220/0011308000003266
PB - SciTePress