Transcript
Page 1: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ALL YOUR FACEARE BELONG TO US

BREAKING FACEBOOK'S SOCIAL AUTHENTICATION

FEDERICO MAGGINECSTLAB, POLITECNICO DI MILANO

Page 2: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ABOUT THE TITLE

JAPANESE-TO-ENGLISH TRANSLATION ERROR

EU EDITION OF "ZERO WING" CONSOLE GAME, 1991

BECAME AN INTERNET MEME, 2000

"All Your Face are Belong to Us"

Page 3: All Our Face are Belong to us: Breaking Facebook's Social Authentication

CATS:連邦政府軍のご協力により、君達の基地は、全てCATSがいただいた。

CATS: All your base are belong to us.

CATS: With the cooperation of Federation Forces,all of your bases now belong to us.

Page 4: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 5: All Our Face are Belong to us: Breaking Facebook's Social Authentication

JOINT WORK

MARCO LANCINIFEDERICO MAGGISTEFANO ZANERO

POLITECNICO DI MILANO, ITALY

JASON POLAKISSOTIRIS IOANNIDIS

FORTH, GREECEGEORGIOS KONTAXISANGELOS KEROMYTIS

COLUMBIA UNIVERSITY, US

ACCEPTED AT ACSAC 2012

Page 6: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ONLINE SOCIAL NETWORKS

Page 7: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ONLINE SOCIAL NETWORKS (2013)

FacebookTencent QQ

Google+Twitter

LinkedinTencent Qzone

Sina WeiboWindows Live

Instagram

Registered Users Active Users1+ billion 1 billion784+ million 712 million500+ million 235 million500+ million 200+ million200+ million 160 million597+ million 150 million400+ million 100+ million100 million 100 million100+ million 100 million

Wikipedia"List of virtual communities with more than 100 million active users"

Page 8: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ONLINE SOCIAL NETWORKS

FACEBOOK REACHED 1+ BILLION ACTIVE USERS

1/7th OF THE WORLD POPULATION

MASSIVE USER BASE

APPEALING TARGET FOR ONLINE CRIME

Page 9: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ONLINE SOCIAL NETWORKS ABUSED

IDENTITY THEFT

SPAMMING

PHISHING

SELLING CREDIT CARDS SELLING STOLEN ACCOUNTS

Page 10: All Our Face are Belong to us: Breaking Facebook's Social Authentication

MALICIOUS FACEBOOK ACCOUNTS

Gao et al."Detecting and Characterizing Social Spam Campaigns"

ACM Internet Measurement Conference, 2010

97% ARE REAL, COMPROMISED ACCOUNTS

Page 11: All Our Face are Belong to us: Breaking Facebook's Social Authentication

MAIN CAUSES OF STOLEN ACCOUNTS

INFORMATION-STEALING MALWARE

SOCIAL ENGINEERING

PHISHING

Page 12: All Our Face are Belong to us: Breaking Facebook's Social Authentication

KEEPING STOLEN ACCOUNTS SAFE

MULTI-FACTOR AUTHENTICATION

SOMETHING YOU KNOW: A PASSWORD

SOMETHING YOU HAVE: A TOKEN

Page 13: All Our Face are Belong to us: Breaking Facebook's Social Authentication

Paul Applegatehttp://www.flickr.com/photos/mrapplegate/1287965486/

Page 14: All Our Face are Belong to us: Breaking Facebook's Social Authentication

DRAWBACKS

LOW ACCEPTANCE

CUMBERSOME

CAN BE LOST

Page 15: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FACEBOOK'S APPROACH

SOMETHING YOU HAVE (TOKEN)

SOMEONE YOU KNOW (FRIEND)

Page 16: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 17: All Our Face are Belong to us: Breaking Facebook's Social Authentication

"A CONTINUED COMMITMENT TO SECURITY"

https://www.facebook.com/blog/blog.php?post=486790652130

Page 18: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 19: All Our Face are Belong to us: Breaking Facebook's Social Authentication

WHEN DOES IT COME INTO PLAY?

GEO LOCATION THAT YOU NEVER ACCESSED FROM

FIRST TIME YOU USE A COMPUTER

Page 20: All Our Face are Belong to us: Breaking Facebook's Social Authentication

HOW DOES IT WORK?

7 FRIENDS TO IDENTIFY

3 PHOTOS PER FRIEND

6 SUGGESTIONS

2 MISTAKES

FRIENDS PHOTOS TAGSGROUND TRUTH

Page 21: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ADVANTAGES OF SOCIAL AUTHENTICATION

PEOPLE ACCUSTOMED TO TAGGING FRIENDS

MORE USER FRIENDLY THAN A TOKEN

LOOKS LIKE A GAME

Page 22: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ADVERSARY MODEL

ANYONE OUTSIDE THE VICTIM'S SOCIAL CIRCLE

A STRANGER

CLOSE COMMUNITIES

CLOSE FRIENDS

FAMILY

Page 23: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ASSUMPTION

THE ATTACKER CANNOT INFILTRATEINTO THE VICTIM'S SOCIAL CIRCLE

Page 24: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SECURITY WEAKNESSES

5 FRIENDS TO IDENTIFY

3 PHOTOS PER FRIEND

6 SUGGESTIONS

2 MISTAKES

is information is publicly available to some degree.

Page 25: All Our Face are Belong to us: Breaking Facebook's Social Authentication

CAN AN ATTACKER BYPASSSOCIAL AUTHENTICATION

AUTOMATICALLY?

(#1 CASUAL ATTACKER)

Page 26: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FRIENDS

Page 27: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SECURITY WEAKNESSES TAKE 2

7 5 FRIENDS TO IDENTIFY3 PHOTOS PER FRIEND

6 SUGGESTIONS

2 MISTAKES

FRIENDS PHOTOS TAGSGROUND TRUTH

Page 28: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PUBLIC FRIENDS LIST

47% OF USERS LEAVE THEIR FRIEND LIST PUBLIC

R. Dey at al.Facebook users have become much more private: A large-scale study.

IEEE Workshop on Security and Social Networking, 2012

"Are friend lists publicly reachable?"

Page 29: All Our Face are Belong to us: Breaking Facebook's Social Authentication

CAN AN ATTACKER BYPASSSOCIAL AUTHENTICATION

AUTOMATICALLY?

(#2 DETERMINED ATTACKER)

Page 30: All Our Face are Belong to us: Breaking Facebook's Social Authentication

ACCEPT BEFRIEND REQUESTS?

70% OF USERS ACCEPT BEFRIEND REQUESTS BLINDLY

D. Irani et al.Reverse social engineering attacks in online social networks.

DIMVA 2011

100%-47% = 53% OF USERS LEAVE THEIR FRIEND LIST PRIVATE

Page 31: All Our Face are Belong to us: Breaking Facebook's Social Authentication

47% OF USERS LEAVE THEIR FRIEND LIST PUBLIC

53% OF USERS LEAVE THEIR FRIEND LIST PRIVATE

70% OF USERS ACCEPT BEFRIEND REQUESTS BLINDLY

47% + 53% * 70%

84% OF THE USERS

MATH: FRIEND LIST REACHABILITY

Page 32: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FRIENDS PHOTOS TAGSGROUND TRUTH84%

Page 33: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PHOTOS

Page 34: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PUBLIC PHOTOS: A CLOSER LOOK

71% OF THE USER LEAVE THEIR PHOTOS PUBLIC

We measured this on a sample of 236,752 Facebook users.

"Are photos publicly reachable?"

FRIENDS PHOTOS TAGSGROUND TRUTH

Page 35: All Our Face are Belong to us: Breaking Facebook's Social Authentication

71% OF THE USER LEAVE THEIR PHOTOS PUBLIC

29% OF USERS LEAVE THEIR PHOTOS PRIVATE

70% OF USERS ACCEPT BEFRIEND REQUESTS BLINDLY

84% * (71% + 29% * 70%)

77% OF THE USERS

MATH: PHOTO REACHABILITY

Page 36: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FRIENDS PHOTOS TAGSGROUND TRUTH84% 77%

Page 37: All Our Face are Belong to us: Breaking Facebook's Social Authentication

TAGS

Page 38: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PUBLIC TAGS

42% OF THE TAGS ARE REACHABLEPUBLIC TAGS + PRIVATE TAGS ON PUBLIC PHOTOS

We measured this on a sample of 236,752 Facebook users.

"Are tags publicly reachable?"

FRIENDS PHOTOS TAGSGROUND TRUTH

Page 39: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FRIENDS PHOTOS TAGSGROUND TRUTH84% 77% 42%

Page 40: All Our Face are Belong to us: Breaking Facebook's Social Authentication

THE GUESS SPACE FORAN ATTACKER IS NARROW.

Page 41: All Our Face are Belong to us: Breaking Facebook's Social Authentication

COULD AN ATTACKERNARROW IT FURTHER?

Page 42: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PHOTOS TAKE 2

Page 43: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PUBLIC PHOTOS A CLOSER LOOK

82% OF PHOTOS IN SOCIAL AUTH. CONTAIN FACES

vs.

ONLY 69% OF PHOTOS CONTAIN FACES OVERALL

We measured this on a sample of 6,115 photos.

"Does Facebook select the photos for social auths?"

FRIENDS PHOTOS TAGSGROUND TRUTH

Page 44: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FACEBOOK PICKSPHOTOS THAT CONTAIN FACES.

Page 45: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FRIENDS PHOTOS TAGSGROUND TRUTH84% 77% 42%

82%

Page 46: All Our Face are Belong to us: Breaking Facebook's Social Authentication

PRACTICAL ATTACK STEP1

CRAWLING FRIENDS LIST OF THE VICTIM (1)

COLLECTING THEIR TAGGED PHOTOS (2)

FACE MODELING (3)

DATABASE OFFACE MODELS

Page 47: All Our Face are Belong to us: Breaking Facebook's Social Authentication

Who is "Mister X"?

NAME! FACE RECOGNITION PHOTO

SOCIAL AUTHENTICATION

PRACTICAL ATTACK STEP2

DATABASE OFFACE MODELS

Page 48: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FACE MODELING AND RECOGNITION

what did we use?

Page 49: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 50: All Our Face are Belong to us: Breaking Facebook's Social Authentication

acquired by

Page 51: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SO, AN ATTACKER COULD EVEN USE FACEBOOK'S OWN TECHNOLOGY TO

BYPASS ITS SOCIAL AUTHENTICATION

AH...THE IRONY

Page 52: All Our Face are Belong to us: Breaking Facebook's Social Authentication

EXPERIMENTAL EVALUATION

CASUAL ATTACKER

ONLY PUBLICLY AVAILABLE INFORMATION

NO BEFRIEND REQUESTS

Page 53: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SUCCESS OF THE CASUAL ATTACKER

22% FULL SOLUTION

56% 1–2 GUESSES NEEDED

78% OVERALL (2 MISTAKES ALLOWED)

Page 54: All Our Face are Belong to us: Breaking Facebook's Social Authentication

WHEN THE CASUAL ATTACKER FAILS

25% NO FACES IN THE PHOTOS

50% UNRECOGNIZABLE FACE

25% NO FACE MODEL FOUND

Page 55: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 56: All Our Face are Belong to us: Breaking Facebook's Social Authentication

EXPERIMENTAL EVALUATION

DETERMINED ATTACKER

ACCESS TO 77% OF THE PHOTOS

EMULATED OFFLINE

Page 57: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SUCCESS OF THE DETERMINED ATTACKER

FACES CRAWLED

30

90

120

MINIMUM SUCCESS RATE

42%

57%

100%

Page 58: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 59: All Our Face are Belong to us: Breaking Facebook's Social Authentication

SPEED OF THE DETERMINED ATTACKER

MAX TIME REQUIRED

100s

140s

150s

MINIMUM SUCCESS RATE

42%

57%

100%< TIMEOUT

Page 60: All Our Face are Belong to us: Breaking Facebook's Social Authentication
Page 61: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FACEBOOK RESPONSE

ACKNOWLEDGED OUR RESULTS

SOCIAL AUTH. MEANT AS A "WEAK" PROTECTION

INEFFECTIVE AGAINST TARGETED ATTACKS

USERS CAN USE LOGIN APPROVAL (WHO DOES IT?)

Page 62: All Our Face are Belong to us: Breaking Facebook's Social Authentication

QUICK REMEDIATIONS

OPT-IN LOGIN APPROVAL (USERS)

REMOVE SUGGESTIONS (FACEBOOK)

REDUCE TIMEOUT (FACEBOOK)

Page 63: All Our Face are Belong to us: Breaking Facebook's Social Authentication

RETHINKING SOCIAL AUTHENTICATION

PEOPLE CAN RECOGNIZE THEIR FRIENDS "LOOK"

USE PHOTOS WITH NO FACES

FACE RECOGNITION

Page 64: All Our Face are Belong to us: Breaking Facebook's Social Authentication

CONCLUSIONS

SOCIAL AUTH. INEFFECTIVE FOR 84% OF THE USERS

THREAT MODEL EXCLUDES OUR TARGETED ATTACK

CLOUD-BASED FACE-RECOGNITION MADE IT EASIER

SOCIAL AUTHENTICATION SHOULD BE REVISITED

Page 65: All Our Face are Belong to us: Breaking Facebook's Social Authentication

FEDERICO MAGGI: @PHRETOR HTTP://MAGGI.CC

FACE

THANK YOU!