论文标题
移动设备身份验证的对手模型
Adversary Models for Mobile Device Authentication
论文作者
论文摘要
超过10年的移动设备身份验证一直是一个高度活跃的研究主题,已经提出和分析了广泛的方法。在相关领域,例如安全渠道协议,远程身份验证或桌面用户身份验证,强,系统性和日益正式的威胁模型已经建立,并用于定性和定量地比较不同的方法。不幸的是,移动设备身份验证的分析通常基于弱对手模型,这表明其各自的安全性过于乐观。在本文中,我们首先介绍了对手的新分类,以更好地分析和比较移动设备身份验证方法。然后,我们将此分类应用于系统文献调查。调查显示,安全性仍然是事后的想法,大多数提议的协议缺乏全面的安全分析。我们提出的对手分类提供了一个强大的统一对手模型,可以在移动设备身份验证方法中提供可比较且透明的安全性分类。
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been proposed and analyzed. In related areas such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have already been established and are used to qualitatively and quantitatively compare different methods. Unfortunately, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we first introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We then apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. Our proposed classification of adversaries provides a strong uniform adversary model that can offer a comparable and transparent classification of security properties in mobile device authentication methods.