首页> 外文会议>IEEE Symposium on Security and Privacy >An Extensive Formal Security Analysis of the OpenID Financial-Grade API
【24h】

An Extensive Formal Security Analysis of the OpenID Financial-Grade API

机译:OpenID金融级API的广泛形式安全分析

获取原文

摘要

Forced by regulations and industry demand, banks worldwide are working to open their customers' online banking accounts to third-party services via web-based APIs. By using these so-called Open Banking APIs, third-party companies, such as FinTechs, are able to read information about and initiate payments from their users' bank accounts. Such access to financial data and resources needs to meet particularly high security requirements to protect customers. One of the most promising standards in this segment is the OpenID Financial-grade API (FAPI), currently under development in an open process by the OpenID Foundation and backed by large industry partners. The FAPI is a profile of OAuth 2.0 designed for high-risk scenarios and aiming to be secure against very strong attackers. To achieve this level of security, the FAPI employs a range of mechanisms that have been developed to harden OAuth 2.0, such as Code and Token Binding (including mTLS and OAUTB), JWS Client Assertions, and Proof Key for Code Exchange. In this paper, we perform a rigorous, systematic formal analysis of the security of the FAPI, based on an existing comprehensive model of the web infrastructure - the Web Infrastructure Model (WIM) proposed by Fett, Küsters, and Schmitz. To this end, we first develop a precise model of the FAPI in the WIM, including different profiles for read-only and read-write access, different flows, different types of clients, and different combinations of security features, capturing the complex interactions in a web-based environment. We then use our model of the FAPI to precisely define central security properties. In an attempt to prove these properties, we uncover partly severe attacks, breaking authentication, authorization, and session integrity properties. We develop mitigations against these attacks and finally are able to formally prove the security of a fixed version of the FAPI. Although financial applications are high-stakes environments, this work is the first to formally analyze and, importantly, verify an Open Banking security profile. By itself, this analysis is an important contribution to the development of the FAPI since it helps to define exact security properties and attacker models, and to avoid severe security risks before the first implementations of the standard go live. Of independent interest, we also uncover weaknesses in the aforementioned security mechanisms for hardening OAuth 2.0. We illustrate that these mechanisms do not necessarily achieve the security properties they have been designed for.
机译:在法规和行业需求的推动下,全球各地的银行都在努力通过基于Web的API向第三方服务开放其客户的在线银行帐户。通过使用这些所谓的Open Banking API,第三方公司(例如FinTechs)能够读取有关其用户银行帐户的信息并从中进行付款。对财务数据和资源的这种访问需要满足特别高的安全性要求,以保护客户。该细分市场中最有希望的标准之一是OpenID金融级API(FAPI),目前由OpenID基金会以开放流程开发,并得到了大型行业合作伙伴的支持。 FAPI是为高风险方案设计的OAuth 2.0的配置文件,旨在针对非常强大的攻击者提供安全保护。为了达到这种安全级别,FAPI采用了一系列强化OAuth 2.0的机制,例如代码和令牌绑定(包括mTLS和OAUTB),JWS客户端断言和代码交换的证明密钥。在本文中,我们基于Fett,Küsters和Schmitz提出的Web基础结构的现有综合模型,对FAPI的安全性进行了严格,系统的形式化分析。为此,我们首先在WIM中开发FAPI的精确模型,包括用于只读和读写访问的不同配置文件,不同的流,不同类型的客户端以及不同的安全功能组合,以捕获复杂的交互。基于Web的环境。然后,我们使用FAPI模型来精确定义中央安全属性。为了证明这些属性,我们发现了部分严重的攻击,破坏了身份验证,授权和会话完整性的属性。我们针对这些攻击制定了缓解措施,最终能够正式证明FAPI固定版本的安全性。尽管金融应用程序是高风险的环境,但这项工作还是首次正式分析并重要地验证Open Banking安全性配置文件的工作。就其本身而言,此分析对FAPI的开发做出了重要贡献,因为它有助于定义确切的安全属性和攻击者模型,并避免在该标准的第一个实施生效之前避免严重的安全风险。在独立利益方面,我们还发现了用于增强OAuth 2.0的上述安全机制中的弱点。我们说明了这些机制不一定能实现其设计所针对的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号