SlideShare a Scribd company logo
1 of 7
The role of Browser Fingerprinting in
Two Factor Authentication
Bart Decuypere
(decuypeb_at_gmail.com)
Authentication: a binary fact?
•
•
•
•

Password correct -> Yes/No
OTP correct -> Yes/No
Certificate Valid -> Yes/No
But: Authentication methods are not infallible
– Password hacked
– Digipass/SmartCard stolen

• Authentication is only for a certain % correct
– (viz. If the method is not corrupted)

• Authentication is a probability!
How can this be improved?
• Multi-Factor authentication!
– Knows
– Has
– Is

• What happens theoretically?
– We multiply the P(is_not(X))
– P(password_is_corrupt)*P(smart_card_is_stolen)
– (fiction) 0,01 * 0,001 = 0,00001 (very small probability
that someone is not who he claims to be)
What is browser fingerprinting?
• Collect characteristics of browser
• Calculate entropy to see whether this
configuration is unique (enough)... -> this is a
probability P(unique)
• If config is unique, we can track the user...
• We can use the browser config as a factor in
multifactor authentication!
– Something the user has!
Objections (What if...?)
• ... the profile is not unique enough
– Add a factor (e.g. password)
– Forward transaction to another device/browser

• ... the browser is taken over by a hacker (MITM)
– Maybe we can see it in the profile?
– Browser is only one factor, there are other factors.
– You can add factors (dynamically until you are certain
enough)

• ... the browser fingerprint changes (due to upgrade,
plugins, ...)
– Use algorithms to map before and after... (this is also
probability, and might cause an extra factor to be used)
New use cases
• As a browser is an extra factor:
– Splitting a transaction over two browsers is more
secure than only using one browser
– Password and browser are two factors
– Each device with a browser can be a 2nd factor
• Smart phone, tablet, other pc...

– 2nd factor devices come at no additional cost
General rule: it’s only multiplying
probabilities
• Determine beforehand your level of certainty
• Use as many factors as you need to obtain
that certainty
– Password
– Browser fingerprint
– Device fingerprint
– Smartcard

• Authentication is not binary! It’s a probability!

More Related Content

Similar to The role of browser fingerprinting in two factor2

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!
ThreatReel Podcast
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
ajaykumar557
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 

Similar to The role of browser fingerprinting in two factor2 (20)

Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Password Problem - Solved!
Password Problem - Solved!Password Problem - Solved!
Password Problem - Solved!
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
Electronic identification
Electronic identificationElectronic identification
Electronic identification
 
120 i143
120 i143120 i143
120 i143
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!
 
Authentication without Authentication - AppSec California
Authentication without Authentication - AppSec CaliforniaAuthentication without Authentication - AppSec California
Authentication without Authentication - AppSec California
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
BSides Indianapolis: Phishing Forensics - Is it just suspicious or is it mali...
BSides Indianapolis: Phishing Forensics - Is it just suspicious or is it mali...BSides Indianapolis: Phishing Forensics - Is it just suspicious or is it mali...
BSides Indianapolis: Phishing Forensics - Is it just suspicious or is it mali...
 
Onfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at ScaleOnfido: Data-Driven Product Management at Scale
Onfido: Data-Driven Product Management at Scale
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

The role of browser fingerprinting in two factor2

  • 1. The role of Browser Fingerprinting in Two Factor Authentication Bart Decuypere (decuypeb_at_gmail.com)
  • 2. Authentication: a binary fact? • • • • Password correct -> Yes/No OTP correct -> Yes/No Certificate Valid -> Yes/No But: Authentication methods are not infallible – Password hacked – Digipass/SmartCard stolen • Authentication is only for a certain % correct – (viz. If the method is not corrupted) • Authentication is a probability!
  • 3. How can this be improved? • Multi-Factor authentication! – Knows – Has – Is • What happens theoretically? – We multiply the P(is_not(X)) – P(password_is_corrupt)*P(smart_card_is_stolen) – (fiction) 0,01 * 0,001 = 0,00001 (very small probability that someone is not who he claims to be)
  • 4. What is browser fingerprinting? • Collect characteristics of browser • Calculate entropy to see whether this configuration is unique (enough)... -> this is a probability P(unique) • If config is unique, we can track the user... • We can use the browser config as a factor in multifactor authentication! – Something the user has!
  • 5. Objections (What if...?) • ... the profile is not unique enough – Add a factor (e.g. password) – Forward transaction to another device/browser • ... the browser is taken over by a hacker (MITM) – Maybe we can see it in the profile? – Browser is only one factor, there are other factors. – You can add factors (dynamically until you are certain enough) • ... the browser fingerprint changes (due to upgrade, plugins, ...) – Use algorithms to map before and after... (this is also probability, and might cause an extra factor to be used)
  • 6. New use cases • As a browser is an extra factor: – Splitting a transaction over two browsers is more secure than only using one browser – Password and browser are two factors – Each device with a browser can be a 2nd factor • Smart phone, tablet, other pc... – 2nd factor devices come at no additional cost
  • 7. General rule: it’s only multiplying probabilities • Determine beforehand your level of certainty • Use as many factors as you need to obtain that certainty – Password – Browser fingerprint – Device fingerprint – Smartcard • Authentication is not binary! It’s a probability!