1. Field of the Invention
The present invention relates generally to network-based computer security and, more particularly, methods of and systems for verifying that network transactions have not been altered, e.g., by a man-in-the-browser attack.
2. Description of the Related Art
Web-based banking and financial transactions today have become preferred by many relative to in-branch or even ATM (automatic teller machine) transactions. Accordingly, security of such web-based transactions has tremendous importance.
One attack to which such web-based transactions are vulnerable is the man-in-the-browser attack. This attack begins with installation of malicious software in a victim computer, commonly by a Trojan horse attack, i.e., fooling a user of the victim computer into unwittingly executing software that installs the malicious software.
The malicious software is installed as a proxy, meaning that the web browser of the victim computer sends and receives all network traffic through the malicious software, which in turn forwards the data to and from a computer network on behalf of the web browser. Mostly, the malicious software forwards data in both directions faithfully, so the user of the victim computer does not observe any unusual behavior by the web browser.
However, the malicious software is typically configured to detect financial transactions. When the user of the victim computer enters data specifying a financial transaction, the malicious software can modify the destination account information and the amount to be transferred so as to re-direct money to an account other than the one intended by the user of the victim computer. The malicious software can then send the modified transaction attributes to the server of the financial institution to effect the unauthorized transaction.
Upon completion of the transaction, the server of the financial institution provides confirmation of the successful completion or scheduling of the transaction. Since the malicious software is a proxy, the malicious software intercepts the confirmation and substitutes the modified data with the data that was originally entered by the user. As a result, the user sees a transaction confirmation that indicates that the transaction was completed or acknowledged as entered by the user. However, this transaction confirmation has been falsified by the malicious software.
The conventional approach to security for web-based transactions includes Secure Sockets Layer (SSL) and Transport Layer Security (TLS). These protocols work at the application layer to encrypt data transported between the client and the server. However, since the encryption is performed at the application layer, the operating system of the victim computer performs the encryption of data sent and the decryption of data received. Among software installed in the victim computer, including the web browser and the malicious software, data is exchanged in clear text, i.e., not encrypted. Accordingly, SSL/TSL does not prevent man-in-the-browser attacks.
Anti-virus and anti-spyware techniques can be used to detect and remove malicious software, but usually only after substantial damage has been done by such malicious software. In addition, people perpetuating man-in-the-browser attacks frequently modify the malicious software to avoid detection. Anti-virus and anti-spyware techniques are therefore inadequate.
What is needed is a way to stop all man-in-the-browser attacks without requiring detection and removal of any malicious software.
In accordance with the present invention, a client computer returns to a server, not only form data entered by the user representing an action to be taken by the server, but also a hash of the form data that is generated by a cryptographic hash function prior to returning the form data. As a result, the hash is generated before any man-in-the-browser proxy has the opportunity to modify the form data.
As used herein, a cryptographic hash function is data processing logic that processes a source body of data to form resulting hash data in such a way that applying the same cryptographic hash function to the source data with any modification will result in different hash data. In general, a good cryptographic hash function will have the following properties: (i) derivation of the source data from the hash data is intractable, (ii) modification of the source data such that the resulting hash data does not change is intractable, and (iii) finding two different bodies of source data that result in identical hash data is intractable.
When the server receives the form data entered by the user to specify an action in accordance therewith, and perhaps modified by a man-in-the-browser proxy, the server also receives the hash of the form data generated before any man-in-the-browser proxy had access to the form data. The server applies the same cryptographic hash function to the received form data to produce a test hash. In one embodiment, the server use the “jsrsasign” (RSA-Sign JavaScript Library) JavaScript implementation of the known PKCS#1 v2.1 RSASSA-PKCS1-v1—5 RSA signing and validation algorithm to cause the web browser to cryptographically sign the form data and hash and to verify the signature of the web browser.
If the test hash matches the received hash, the server determines that the form data has not been modified by any man-in-the-browser proxy and performs the requested action. Conversely, if the test hash does not match the received hash, the server detects modification of the form data, perhaps by a man-in-the-browser proxy, and accordingly declines to perform the requested action.
In situations in which the requested action is a financial transaction, such as a transfer of funds for example, the man-in-the-browser proxy typically modifies the transaction to transfer funds to an account associated with the source of the man-in-the-browser proxy. As a result, the modified transaction data identifies the perpetrator or an accomplice of the man-in-the-browser proxy. While ordinarily the destination account can be emptied and closed before the unauthorized transfer is ever detected, the server detects the attempted fraud before the unauthorized transfer is ever effected. As a result, all harm is prevented and the account of the perpetrator or accomplice is identified while the account is still active.
Other systems, methods, features and advantages of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Component parts shown in the drawings are not necessarily to scale, and may be exaggerated to better illustrate the important features of the invention. In the drawings, like reference numerals may designate like parts throughout the different views, wherein:
In accordance with the present invention, a client device 102 (
A transaction verification system 100 (
Though the user is about to request a financial transaction, it should be appreciated that the techniques described herein can apply to other types of actions—financial or other—requested of server 106. Of the numerous types of actions that can be requested of servers such as server 106, one type that is particularly susceptible to harm from MITB attacks is financial transactions and particularly transfer of funds from one account to another in particular.
Transaction flow diagram 200 (spanning
In step 202 (
It should be noted that web browser 320 and MITB proxy 360 communicate with each other in clear text—the data passed therebetween is readable by both. Secure web-based communications is implemented by SSL/TSL module 354 (
MITB proxy 360 forwards the transaction request to SSL/TSL module 354 in step 204 (
Server 106 includes web server logic 420 (
Server 106 also includes web application logic 422 (
The web-based form is received and decrypted by SSL/TSL module 354 in step 216. Once the web-based form is decrypted, HTTP/HTTPS module 352 forwards the clear text web-based form to MITB proxy 360 in step 218. At this point, MITB proxy 360 can parse the web-based form and recognize the form as representing a financial transfer from one account to another. MITB proxy 360 forwards the web-based form to web browser 320 in step 220.
In step 222, web browser 320 displays the web-based form and receives data that is generated by the user—e.g., by physical manipulation of one or more user input devices 308—and that represents attributes of the transaction that are specified by the user.
In step 224, web browser 320 generates a dynamic device key (DDK) for client computer 102. In particular, a web browser plugin 322 (
There are a number of way in which web browser plugin 322 can generate a device key and a transaction verification key. In one embodiment, web browser plugin 322 generates a dynamic device key in the manner described in U.S. Patent Application Publication US 2011/0009092 and that description is incorporated herein. Briefly, web browser plugin 322 receives a challenge from device authentication server 108 that specifies a number of pieces of system and/or hardware configuration information to be gathered to form a body of data from the gathered information and a key derived from the gathered data by which the body of data is to be cryptographically signed to make the DDK tamper-evident.
In this illustrative embodiment, server 106 requests the challenge from device authentication server 108 and includes the challenge with the transaction form created in step 212 (
Prior to cryptographically signing the body of data, web browser plugin 322 hashes the transaction attributes using the same key to form the transaction verification key and combines the transaction verification key with the body of data prior to cryptographically signing the body of data. Thus, the DDK includes the TVK.
Since the challenge from device authentication server 108 can travel through MITB proxy 360, it is preferred that the challenge be in a form not readily understandable by MITB proxy 360. In one embodiment, the challenge is encrypted using PKI (public key infrastructure) with a public key of web browser plugin 322 such that only web browser plugin 322 can decrypt the challenge.
In alternative embodiments, other techniques can be used by web browser plugin 322 to derive a transaction verification key from the transaction attributes in a manner that is known to device authentication server 108 and obscured from MITB proxy 360 (
Once web browser plugin 322 has generated the dynamic device key and the transaction verification key, e.g., using DDK generator 342, web browser 320 sends the transaction attributes specified by the user, the dynamic device key, and the transaction verification key to MITB proxy 360 for delivery to server 106 in step 230 (
By completion of step 230, MITB proxy 360 may have recognized the transaction as one to be modified and may alter the transaction attributed specified by the user. For example, MITB proxy 360 may replace the recipient's account information with account information of a person intended to receive the funds without consent of the user of client computer 102 and may increase the amount of funds to be transferred up to the available balance of the source account. At this point, none other than MITB proxy 360 realizes that MITB proxy 360 is malicious software and may modify transaction attributes.
In this illustrative embodiment, DDK generator 342 (
In step 232 (
An analogous SSL/TSL module of server 106 decrypts the received data in step 238. At this point, server 106 has the transaction attributes as specified by the user and perhaps modified by MITB proxy 360. In step 240, transaction verification logic 426 (
In step 242 (
When device authentication logic 520 determines which of the devices associated with the user identifier verifies the cryptographic signature of the dynamic device key received in step 240, device authentication logic 520 recognizes the signature key as the key with which the transaction attributes are hashed to form the transaction verification key. Device authentication logic 520 sends the signature key, the transaction verification key parsed from the dynamic device key, and user identifier to server 106 in step 244 (
In step 244, transaction verification logic 426 hashes the transaction attributed received in step 236 using the hash key and/or algorithm received from device authentication server 108 in step 244.
If the transaction attributes received by server 106 in step 236 are exactly as specified by the user, hashing of those attributes by transaction verification logic 426 using the key and/or algorithm received from device authentication server 108 should result in exactly the same hash as the transaction verification key received from device authentication server 108. Transaction verification logic 426 compares the transaction verification key to the hashed transaction attributes in step 248. A match indicates that the received transaction attributes are exactly as specified by the user of client computer 102. A mismatch indicates that the transaction attributes have been modified after the user specified the attributes.
In step 250, the transaction defined by the transaction attributes specified by the user is effected by server 106, thereby actually transferring funds, only if the transaction verification key matches the transaction attributes as hashed by server 106 in step 246.
It should be appreciated that processing according to transaction flow diagram 200 does not attempt to detect the presence of MITB proxy 360 but instead detects modification of attributes of a transaction after the user has specified the attributes. Accordingly, no anti-virus or anti-spyware tools that are configured to recognize a particular instance of a man-in-the-browser attack are required. In addition, since any and all modifications of transaction attributes—including the first modification thereof—is recognized as such, any man-in-the-browser attack is recognized before any financial harm is caused.
Client computer 102 (
CPU 302 and memory 304 are connected to one another through a conventional interconnect 306, which is a bus in this illustrative embodiment and which connects CPU 302 and memory 304 to one or more input devices 308, output devices 310, and network access circuitry 312. Input devices 308 can include, for example, a keyboard, a keypad, a touch-sensitive screen, a mouse, a microphone, and one or more cameras. Output devices 310 can include, for example, a display—such as a liquid crystal display (LCD)—and one or more loudspeakers. Network access circuitry 312 sends and receives data through computer networks such as wide area network 104 (
A number of components of client computer 102 are stored in memory 304. In particular, web browser 320 is all or part of one or more computer processes executing within CPU 302 from memory 304 in this illustrative embodiment but can also be implemented using digital logic circuitry. As used herein, “logic” refers to (i) logic implemented as computer instructions and/or data within one or more computer processes and/or (ii) logic implemented in electronic circuitry. Web browser plug-ins 322 are each all or part of one or more computer processes that cooperate with web browser 320 to augment the behavior of web browser 320. The manner in which a web browser recognizes and interacts with web browser plug-ins to augment the behavior of the web browser is conventional and known and is not described herein.
Installed software 340 and DDK generator 342 are each all or part of one or more computer processes executing within CPU 302 from memory 304. Operating system 350 is all or part of one or more computer processes executing within CPU 302 from memory 304 and can also be implemented using digital logic circuitry. An operating system (OS) is a set of programs that manage computer hardware resources and provide common services for application software such as installed software 340, web browser 320, and web browser plug-ins 322.
HTTP/HTTPS module 352 and SSL/TSL module 354 are modules within operating system 350 and facilitate communications through network access circuitry 312 and wide area network 104 (
Man-in-the-browser proxy 360 is all or part of one or more computer processes that are installed as a proxy. Whether MITB proxy 360 is really part of operating system 350 is a matter of subjective classification and immaterial. However, MITB proxy 360 is installed in such a manner that operating system 350 directs (i) any data from web browser 320 destined for wide area network 104 and (ii) any data from wide area network 104 destined for web browser 320 through MITB proxy 360.
Server 106 is shown in more detail in
CPU 402 and memory 404 are connected to one another through a conventional interconnect 406, which is a bus in this illustrative embodiment and which connects CPU 402 and memory 404 to network access circuitry 412. Network access circuitry 412 sends and receives data through computer networks such as wide area network 104 (
A number of components of server 106 are stored in memory 404 (
Web server logic 420 is a conventional web server. Web application logic 422 is content that defines one or more pages of a web site and is served by web server logic 420 to client devices such as client computer 102 to effect the behavior described above.
Device authentication server 108 is shown in more detail in
CPU 502 and memory 504 are connected to one another through a conventional interconnect 456, which is a bus in this illustrative embodiment and which connects CPU 502 and memory 504 to network access circuitry 512. Network access circuitry 512 sends and receives data through computer networks such as wide area network 104 (
A number of components of device authentication server 108 are stored in memory 504 (
The above description is illustrative only and is not limiting. The present invention is defined solely by the claims which follow and their full range of equivalents. It is intended that the following appended claims be interpreted as including all such alterations, modifications, permutations, and substitute equivalents as fall within the true spirit and scope of the present invention.
Number | Date | Country | Kind |
---|---|---|---|
2012101560 | Oct 2012 | AU | national |
This application claims priority to U.S. Provisional Application No. 61/664,856, which was filed Jun. 27, 2012, and which is fully incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61664856 | Jun 2012 | US |