Faces in the Distorting Mirror
2014, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
https://doi.org/10.1145/2660267.2660317Abstract
In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called social authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition software. Here we demonstrate an alternative attack that employs image comparison techniques to identify the SA photos within an offline collection of the users' photos. In this paper, we revisit the concept of SA and design a system with a novel photo selection and transformation process, which generates challenges that are robust against these attacks. The intuition behind our photo selection is to use photos that fail software-based face recognition, while remaining recognizable to humans who are familiar with the depicted people. The photo transformation process creates challenges in the form of photo collages, where faces are transformed so as to render image matching techniques ineffective. We experimentally confirm the robustness of our approach against three template matching algorithms that solve 0.4% of the challenges, while requiring four orders of magnitude more processing effort.. Furthermore, when the transformations are applied, face detection software fails to detect even a single face. Our user studies confirm that users are able to identify their friends in over 99% of the photos
References (28)
- Amazon Mechanical Turk. https://www.mturk.com/mturk/.
- Eurograbber. https://www.checkpoint.com/products/downloads/ whitepapers/Eurograbber_White_Paper.pdf.
- Facebook Acquires Face.com. http://mashable.com/ 2012/06/18/facebook-acquires-face-com/.
- Facebook Introducing Login Approvals. https://www.facebook.com/note.php?note_id= 10150172618258920.
- Google 2-step. http://www.google.com/landing/2step/.
- L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web. ACM, 2009.
- Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the Annual Computer Security Applications Conference. ACM, 2011.
- E. Bursztein, S. Bethard, C. Fabry, J. C. Mitchell, and D. Jurafsky. How good are humans at solving CAPTCHAs? A large scale evaluation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE, 2010.
- M. Egele, L. Bilge, E. Kirda, and C. Kruegel. Captcha smuggling: Hijacking web browsing sessions to create captcha farms. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10', pages 1865-1870. ACM, 2010.
- M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS), 2013.
- S. Gauglitz, T. Höllerer, and M. Turk. Evaluation of interest point detectors and feature descriptors for visual tracking. Int. J. Computer Vision, 94(3):335-360, 2011.
- G. Goswami, B. M. Powell, M. Vatsa, R. Singh, and A. Noore. FaceDCAPTCHA: Face detection based color image CAPTCHA. In Future Generation Computer Systems (September 2012).
- J. Huang, Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, and Z. M. Mao. Socialwatch: detection of online service abuse via large-scale social In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13', 2013.
- D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment, DIMVA'11, 2011.
- E. Jeremy, J. R. Douceur, J. Howell, and J. Sault. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the 14th ACM conference on Computer and communications security (CCS). ACM, 2007.
- H. Kim, J. Tang, and R. Anderson. Social authentication: harder than it looks. In Proceedings of the 2012 Financial Cryptography and Data Security conference. Springer.
- G. Kontaxis, M. Polychronakis, A. D. Keromytis, and E. P. Markatos. Privacy-preserving social plugins. In Proceedings of the 21st USENIX conference on Security symposium, Security'12. USENIX Association.
- Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: User expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11'. ACM, 2011.
- M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: Captchas: understanding captcha-solving services in an economic context. In Proceedings of the 19th USENIX conference on Security, USENIX Security'10. USENIX Association, 2010.
- I. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. Keromytis, and S. Zanero. All your face are belong to us: Breaking facebook's social authentication. In Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12'. ACM, 2012.
- A. Rice. Facebook -A Continued Commitment to Security, Jan 2011. http: //www.facebook.com/blog.php?post=486790652130.
- Y. Rui and Z. Liu. Artifacial: Automated reverse turing test using facial features. In In Multimedia, pages 295-298. ACM Press, 2003.
- A. Shulman. The underground credentials market. Computer Fraud & Security, 2010(3):5-8, March 2010.
- Y. Taigman and L. Wolf. Leveraging billions of faces to overcome performance barriers in unconstrained face recognition. CoRR, abs/1108.1122, 2011.
- B. E. Ur and V. Ganapathy. Evaluating attack amplification in online social networks. In Proceedings of the 2009 Web 2.0 Security and Privacy Workshop.
- S. Vikram, Y. Fan, and G. Gu. SEMAGE: A New Image-based Two-Factor CAPTCHA. In Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), December 2011.
- S. Yardi, N. Feamster, and A. Bruckman. Photo-based authentication using social networks. In Proceedings of the first workshop on Online social networks, WOSN '08'. ACM, 2008.
- B. B. Zhu, J. Yan, Q. Li, C. Yang, J. Liu, N. Xu, M. Yi, and K. Cai. Attacks and design of image recognition captchas. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10'. ACM, 2010.