Threat |
Defense |
Stolen laptop |
N |
Stolen phone |
Most |
All devices stolen and hardware hacked |
|
Phishing credentials |
|
Phishing site looks like legit site in order to get signed credentials
from the user |
|
Keylog |
|
Malware on laptop |
|
Malware gets added to phone (including phone gets rooted case) |
|
MITM/MITB |
|
Eurograbber |
|
Cloned evil OneID app |
|
Phish intricate |
|
Compromise user's email account |
|
Compromise SMS |
|
Compromise OneID repo (read and write compromises) |
|
Compromise OneID pairing server |
|
Compromise OneID javascript server |
|
Compromise OneID helper service |
|
Attacker finds recovery code in email or wallet |
|
PIN reset process |
|
Password reset process |
|
Steal device; completely lock out legit user; Create new recovery code |
|
Brute force PIN or password attack |
|
Clone credentials from AD |
|
Clone credentials from CD |
|
Register OneID before legiti user |
|
Attacker links OneID to American Express account before or after legit
user |
|
Steal credit card, then create OneID using stolen credit card |
|
Public terminal has malware and you pair with it |
|
Left OneID credential on public terminal after usage |
|
DNS compromise |
|
Wifi AP is corrupt; it listens in conversation, delivers wrong DNS info,
etc. |
|
DDOS against OneID servers |
|
OneID server hardware failure/ OneID general site failure (no Internet,
power, etc) |
|
Brute force password guess attack for a specific account causing pairing
lockout for legit user |
|
PIN/password throttle document (e.g., pairing attacks in order to have
infinite number of guesses for password or PIN) |
|
Attacker threatens you with a gun to hand over your cell phone and give
him your password and PIN |
distress PIN |
Use AD to make CD or CD to make an AD |
there are two device classes and they are independent |