Title
All your face are belong to us: breaking Facebook's social authentication
Abstract
Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal analysis of social authentication weaknesses against attackers inside the victim's social circles. In this paper, we extend the threat model and study the attack surface of social authentication in practice, and show how any attacker can obtain the information needed to solve the challenges presented by Facebook. We implement a proof-of-concept system that utilizes widely available face recognition software and cloud services, and evaluate it using real public data collected from Facebook. Under the assumptions of Facebook's threat model, our results show that an attacker can obtain access to (sensitive) information for at least 42% of a user's friends that Facebook uses to generate social authentication challenges. By relying solely on publicly accessible information, a casual attacker can solve 22% of the social authentication tests in an automated fashion, and gain a significant advantage for an additional 56% of the tests, as opposed to just guessing. Additionally, we simulate the scenario of a determined attacker placing himself inside the victim's social circle by employing dummy accounts. In this case, the accuracy of our attack greatly increases and reaches 100% when 120 faces per friend are accessible by the attacker, even though it is very accurate with as little as 10 faces.
Year
DOI
Venue
2012
10.1145/2420950.2421008
ACSAC
Keywords
Field
DocType
social circle,social authentication weakness,two-factor authentication,determined attacker,social authentication,two-factor authentication mechanism,social authentication challenge,casual attacker,threat model,social authentication test,authentication,face recognition
Facial recognition system,Internet privacy,Attack surface,Authentication,Computer science,Threat model,Computer security,Casual,Social circle,Cloud computing
Conference
Citations 
PageRank 
References 
15
0.79
17
Authors
7
Name
Order
Citations
PageRank
Iasonas Polakis124714.87
Marco Lancini2221.25
Georgios Kontaxis317811.87
Federico Maggi452437.68
Sotiris Ioannidis51383130.64
Angelos D. Keromytis64678385.02
Stefano Zanero773653.78