skip to main content
10.1145/3488932.3497756acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Public Access

SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication

Published: 30 May 2022 Publication History

Abstract

SMS-based two-factor authentication (2FA) is the most widely deployed 2FA mechanism, despite the fact that SMS messages are known to be vulnerable to rerouting attacks, and despite the availability of alternatives that may be more secure. This is for two reasons. First, it is very effective in practice, as evidenced by reports from Google and Microsoft. Second, users prefer SMS over alternatives, because text messaging is already part of their daily communication. Accepting this practical reality, we developed a new SMS-based protocol that makes rerouting attacks useless to adversaries who aim to take over user accounts. Our protocol delivers one-time passwords (OTP) via text message in a manner that adds minimal overhead (to both the user and the server) over existing SMS-based methods, and is implemented with only small changes to the stock text-message applications that already ship on mobile phones. The security of our protocol rests upon a provably secure authenticated key exchange protocol that, crucially, does not place significant new burdens upon the user. Indeed, we carry out a user study that demonstrates no statistically significant difference between traditional SMS and our protocol, in terms of usability.

Supplementary Material

MP4 File (ASIA-CCS22-fp53.mp4)
SMS-based two-factor authentication (2FA) is the most widely deployed and user preferred 2FA mechanism, despite the fact that SMS messages are known to be vulnerable to rerouting attacks and the availability of more secure alternatives. A new SMS-based protocol for OTP delivery has been developed at the University of Florida that makes rerouting attacks, such as SIM swap attacks, useless to adversaries who aim to take over user accounts. The SOS protocol delivers one-time passwords (OTP) via text message with minimal added overhead over existing SMS-based methods and does not negatively impact the user experience. Christian Peeters presents the paper "SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication" published at the 2022 ACM Asia Conference on Computer and Communications Security. This research was authored by himself, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, and Patrick Traynor at the Florida Institute for Cyber Security Research.

References

[1]
2017. SMS SS7 Fraud. Technical Report IR.70. GSMA.
[2]
2020. Authy. https://authy.com/.
[3]
2020. Duo U2F and Biometrics. https://duo.com/product/multi-factor- authentication-mfa/authentication-methods/u2f-and-biometrics.
[4]
2020. FIDO2 U2F Passwordless authentication. https://www.yubico.com/ authentication-standards/fido2/.
[5]
2020. Google Authenticator. https://support.google.com/accounts/answer/ 1066447.
[6]
2020. List of websites and whether or not they support 2FA. https:// twofactorauth.org.
[7]
2020. Ting Mobile Rates. https://ting.com/rates.
[8]
2020. Tips to complete account recovery steps. https://support.google.com/ accounts/answer/7299973.
[9]
2020. "Two-factor authentication for Apple ID". https://support.apple.com/en- us/HT204915.
[10]
2020. Use of SMS or Call Log Permsissions. https://support.google.com/ googleplay/android-developer/answer/9047303.
[11]
2020. What is Diameter Protocol? https://ribboncommunications.com/company/ get-help/glossary/diameter-protocol.
[12]
2020. What is the Additional verification page? https://docs.microsoft.com/en- us/azure/active-directory/user-help/multi-factor-authentication-end-user- first-time.
[13]
2020. Works with YubiKey Catalog. https://www.yubico.com/works-with- yubikey/catalog/.
[14]
2020. Yubico. https://www.yubico.com/.
[15]
Robert Abel. 2019. SS7 exploited to intercept 2FA bank confirmation codes to raid accounts. scmagazine.com. hrefhttps://www.scmagazine.com/home/security-news/cybercriminals-are-exploiting-flaws-in-ss7-a-protocol-used-by-telecom-companies-to-coordinate-how-they-route-texts-and-calls-around-the-world-to-empty-bank-accounts/.
[16]
Mozhgan Azimpourkivi, Umut Topkara, and Bogdan Carbunar. 2017. Camera based two factor authentication through mobile and wearable devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 1, 3, 35.
[17]
Paddy Baker. 2020. Crypto Exec's $1.8M SIM-Swap Lawsuit Has `Critical Holes,` Says AT&T. https://www.coindesk.com/crypto-execs-1--8m-sim-swap-lawsuit-full-of-critical-holes-says-att.
[18]
Sam Baker. 2019. Criminals hacking phone codes used by customers to verify bank transactions. https://www.telegraph.co.uk/money/consumer-affairs/banks-hit-mobile-phone-hacke/.
[19]
Richard Barnes, Benjamin Beurdouche, Jon Millican, Emad Omara, Katriel Cohn-Gordon, and Raphael Robert. 2019. The Messaging Layer Security (MLS) Protocol. Internet-Draft draft-ietf-mls-protocol-08. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-ietf-mls-protocol-08 Work in Progress.
[20]
Mihir Bellare and Phillip Rogaway. 1994. Entity Authentication and Key Distribution. In Advances in Cryptology -- CRYPTO' 93. Springer Berlin Heidelberg, Berlin, Heidelberg, 232--249.
[21]
Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In PKC -- Proceedings of the 9th International Conference on Theory and Practice of Public Key Cryptography. 207--228.
[22]
Peter Bright. 2011. RSA finally comes clean: SecurID is compromised. https://arstechnica.com/information-technology/2011/06/rsa-finally-comes-clean-securid-is-compromised/.
[23]
John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry, Vol. 189, 194 (1996), 4--7.
[24]
Elie Bursztein. 2018. The bleak picture of two-factor authentication adoption in the wild. https://elie.net/blog/security/the-bleak-picture-of-two-factor-authentication-adoption-in-the-wild/#toc-4.
[25]
Catalin Cimpanu. 2019. Microsoft: Using multi-factor authentication blocks 99.9% of account hacks. zdnet.com. hrefhttps://www.zdnet.com/article/microsoft-using-multi- factor-authentication-blocks- 99-9-of-account-hacks/.
[26]
Stéphane Ciolino, Simon Parkin, and Paul Dunphy. 2019. Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling. https://www.usenix.org/conference/soups2019/presentation/ciolino. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA.
[27]
Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. ?It's not actually that horrible" Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--11.
[28]
Joseph Cox. 2017. Senator Demands Answers From Telecom Giants on Phone Spying. https://www.thedailybeast.com/senator-demands-answers-from-telecom-giants-on-phone-spying.
[29]
Joseph Cox. 2019. Criminals Are Tapping into the Phone Network Backbone to Empty Bank Accounts. https://motherboard.vice.com/en_us/article/mbzvxv/criminals-hackers-ss7-uk-banks-metro-bank.
[30]
D. DeFigueiredo. 2011. The Case for Mobile Two-Factor Authentication. IEEE Security Privacy, Vol. 9, 5 (Sept. 2011), 81--85.
[31]
Dominique Lazanski. 2016. Interconnect Security.
[32]
Thomas Fox-Brewster. 2017. All That's Needed To Hack Gmail And Rob Bitcoin: A Name And A Phone Number. https://www.forbes.com/sites/thomasbrewster/2017/09/18/ss7-google-coinbase-bitcoin-hack/#484e841941a4.
[33]
Kathleen Garska. 2018. Two-Factor Authentication (2FA) Explained: Email and SMS OTPs. https://blog.identityautomation.com/two-factor-authentication-2fa-explained-email-and-sms-otps.
[34]
Conor Gilsenan. 2018. SMS: The most popular and least secure 2FA method. https://www.thingsauth.com/2018/02/27/sms-the-most-popular-and-least-secure-2fa-method/.
[35]
Paul A Harris, Kirstin W Scott, Laurie Lebo, NikNik Hassan, Chad Lighter, and Jill Pulley. 2012. ResearchMatch: a national registry to recruit volunteers for clinical research. Academic medicine: journal of the Association of American Medical Colleges, Vol. 87, 1 (2012), 66.
[36]
Sandra G Hart and Lowell E Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. In Advances in psychology. Vol. 52. Elsevier, 139--183.
[37]
Evolved Intelligence. [n.d.]. SS7 & Diameter Firewall. https://www.evolved-intelligence.com/products/fraud-and-security/signalling-firewall.
[38]
Michael Kan. 2018. Hackers Beat Two-Factor Protection With Automated Phishing Attacks. pcmag. hrefhttps://www.pcmag.com/news/hackers-beat-two-factor-protection-with-automated-phishing-attacks.
[39]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In USENIX Security Symposium (USENIX Security 15). USENIX Association. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos
[40]
Radhesh Krishnan Konoth, Björn Fischer, Wan Fokkink, Elias Athanasopoulos, Kaveh Razavi, and Herbert Bos. 2020. SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. In 5th IEEE European Symposium on Security and Privacy (EuroS&P 2020).
[41]
Brian Krebs. 2019. Why Phone Numbers Stink As Identity Proof. https://krebsonsecurity.com/tag/sim-swap/.
[42]
Kyle Lady. 2015. Duolytics: Four Years with Four Factors. https://duo.com/blog/duolytics-four-years-with-four-factors.
[43]
Brian LaMacchia, Kristin Lauter, and Anton Mityagin. 2007. Stronger Security of Authenticated Key Exchange. In Provable Security, Willy Susilo, Joseph K. Liu, and Yi Mu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--16.
[44]
Ponemon Institute LLC. 2019. The 2019 State of Password and Authentication Security Behaviors Report. https://www.yubico.com/wp-content/uploads/2019/01/Ponemon-Authentication-Report.pdf.
[45]
Napier Lopez. 2019. Google data shows 2-factor authentication blocks 100% of automated bot hacks. https://thenextweb.com/google/ 2019/05/23/google-data-shows-2 -factor-authentication-blocks- 100-of-automated-bot-hack.
[46]
G. Lorenz. 2001. Securing SS7 telecommunications networks. Proceedings of the Second Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop.
[47]
Ronnie Manning. 2019. Yubico Releases the 2019 State of Password and Authentication Security Behaviors Report. https://www.yubico.com/2019/01/yubico-releases-the-2019-state-of-password-and-authentication-security-behaviors-report/.
[48]
Venkadesan Marimuthu. 2019. Fraudulent subscriber identity module (SIM) swap detection. United States Patent 10178223.
[49]
Rene Mayrhofer and Hans Gellersen. 2007. Shake Well Before Use: Authentication Based on Accelerometer Data. In Pervasive Computing, Anthony LaMarca, Marc Langheinrich, and Khai N. Truong (Eds.).
[50]
T. Moore, T. Kosloff, J. Keller, G. Manes, and S. Shenoi. 2002. Signaling system 7 (SS7) network security. In The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002., Vol. 3. III--III. https://doi.org/10.1109/MWSCAS.2002.1187082
[51]
Megan Morreale. 2017. Daily SMS Mobile Usage Statistics. https://www.smseagle.eu/2017/03/06/daily-sms-mobile-statistics/.
[52]
D. M'Raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen. 2005. HOTP: An HMAC-Based One-Time Password Algorithm. RFC 4226. RFC Editor.
[53]
Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, and Jean-Pierre Seifert. 2013. SMS-Based One-Time Passwords: Attacks and Defense. In Detection of Intrusions and Malware, and Vulnerability Assessment, Konrad Rieck, Patrick Stewin, and Jean-Pierre Seifert (Eds.). Springer Berlin Heidelberg.
[54]
Action Fraud News. 2014. Alert - how you can be scammed by a method called SIM Splitting.
[55]
Newsbtc. 2017. Hackers Find Exploit Through SS7 SMS 2FA to Empty Bitcoin Wallets. https://www.newsbtc.com/2017/09/30/hackers-find-exploit-sms-two-factor-authentication-empty-bitcoin-wallets/.
[56]
Sai Fong Ngan, Wai Ching Vincent Lok, and Kwok Hung Cheung. 2015. Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device. US Patent App. 14/284,464.
[57]
Tatsuaki Okamoto and David Pointcheval. 2001. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. In Public Key Cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, 104--118.
[58]
Thuy Ong. 2018. Over 90 percent of Gmail users still don't use two-factor authentication. https://www.theverge.com/2018/1/23/16922500/gmail-users-two-factor-authentication-google.
[59]
Tom Parker. 2019. Shane Dawson, James Charles, King Bach, and other YouTubers hacked after alleged AT&T SIM swap. https://reclaimthenet.org/shane-dawson-james-charles-youtubers-hacked-att-sim-swap/.
[60]
Christian Peeters, Hadi Abdullah, Nolen Scaife, Jasmine Bowers, Patrick Traynor, Bradley Reaves, and Kevin Butler. 2018. Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. In 39th IEEE Symposium on Security and Privacy (IEEE Security and Privacy 18).
[61]
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. 2015. Two-Factor Authentication: Is the World Ready? Quantifying 2FA Adoption. In Proceedings of the Eighth European Workshop on System Security (EuroSec '15). Association for Computing Machinery, New York, NY, USA.
[62]
Nathaniel Popper. 2019. Hackers Hit Twitter C.E.O. Jack Dorsey in a `SIM Swap.` You're at Risk, Too. https://www.nytimes.com/2019/09/05/technology/sim-swap-jack-dorsey-hack.html.
[63]
Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, and Kevin Butler. 2015. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. In Proceedings of the USENIX Security Symposium (SECURITY).
[64]
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS).
[65]
J Sauro. 2012. 10 things to know about the Single Ease Question (SEQ). Measuring U, 2012 (2012).
[66]
Duo Security. 2017a. Share of internet users in the United States who use two-factor authentication in 2010 and 2017, by method. https://www.statista.com/statistics/789942/us-use-of-two-factor-authentication/.
[67]
Duo Security. 2017b. Share of internet users in the United States who use two-factor authentication in 2013 and 2017. https://www.statista.com/statistics/789473/us-use-of-two-factor-authentication/.
[68]
RSA Security. 2004. RSA SecurID Solution Named Best Third-Party Authentication Device by Windows IT Pro Magazine Readers' Choice 2004. https://web.archive.org/web/20100106232859/http://rsa.com/press_release.aspx?id=5028.
[69]
R Core Team. 2013. R: A language and environment for statistical computing. (2013).
[70]
Positive Technologies. 2018. Diameter vulnerabilities exposure report. https://www.ptsecurity.com/ww-en/analytics/diameter-2018/.
[71]
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security. 195--210.
[72]
Bill Toulas. 2019. SS7 Attacks Against Telecom Infrastructure Now on the Rise. https://www.technadu.com/telecom-infrastructure-ss7-attacks-rise/56704/.
[73]
International Telecommunication Union. [n.d.]. ITU Standard Q.700 : Introduction to CCITT Signalling System No. 7. https://www.itu.int/rec/T-REC-Q.700/en.
[74]
Serge Vaudenay. 2005. Secure Communications over Insecure Channels Based on Short Authenticated Strings. In Advances in Cryptology -- CRYPTO 2005, Victor Shoup (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 309--326.
[75]
Mingyue Wang, Wen-Tao Zhu, Shen Yan, and Qiongxiao Wang. 2018. SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals. In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 1--9.
[76]
Catherine S Weir, Gary Douglas, Martin Carruthers, and Mervyn Jack. 2009. User perceptions of security, convenience and usability for ebanking authentication tokens. Computers & Security, Vol. 28, 1--2 (2009), 47--62.
[77]
Kenneth P. Weiss. 1984. Method and apparatus for positively identifying an individual. U.S. Patent US4720860A,.
[78]
Frank Wilcoxon. 1992. Individual comparisons by ranking methods. In Breakthroughs in statistics. Springer, 196--202.
[79]
Ben Winck. 2019. One cryptocurrency investor reportedly lost $24 million worth of bitcoin in a SIM swap attack. https://markets.businessinsider.com/currencies/news/bitcoin-investor-loses-24-million-of-crypto-sim-swap-hackers-2019-11-1028677818.
[80]
Yubico. 2018. YubiKey 5 Series: The Multi-Protocol Security Key. https://www.yubico.com/wp-content/uploads/2019/08/191238-YK5Series-Solution-Brief-r10.pdf.
[81]
Dimitra Zarafeta, Christina Katsini, George E Raptis, and Nikolaos M Avouris. 2019. UltraSonic Watch: Seamless Two-Factor Authentication through Ultrasound. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, LBW2614.
[82]
Verena Zimmermann and Nina Gerber. 2020. The password is dead, long live the password. A laboratory study on user perceptions of authentication schemes. International Journal of Human-Computer Studies, Vol. 133 (2020), 26--44. https://doi.org/10.1016/j.ijhcs.2019.08.006 hrefhttp://www.sciencedirect.com/science/article/pii/S1071581919301119.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
May 2022
1291 pages
ISBN:9781450391405
DOI:10.1145/3488932
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authenticated key-exchange
  2. cellular
  3. security
  4. sms
  5. two-factor authentication

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)677
  • Downloads (Last 6 weeks)82
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media