2021
DOI: 10.1109/tdsc.2019.2908907
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes

Abstract: Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance dimension. We analyze web authentication mechanisms with respect to new usability and security properties related to mimicry-resist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…It is unclear how many of the browser-implemented reinforcements for HTTPS are adopted in DoT, and how the relatively lax security in DoT affects issued certificates. For example, successful authentication [4] and encryption are unnecessary in DoT depending on the client's configured usage profile (see opportunistic mode in RFC 7858 [42]). We present results upon comparing a random sample of DoT and HTTPS certificates collected from Rapid7 [32].…”
mentioning
confidence: 99%
“…It is unclear how many of the browser-implemented reinforcements for HTTPS are adopted in DoT, and how the relatively lax security in DoT affects issued certificates. For example, successful authentication [4] and encryption are unnecessary in DoT depending on the client's configured usage profile (see opportunistic mode in RFC 7858 [42]). We present results upon comparing a random sample of DoT and HTTPS certificates collected from Rapid7 [32].…”
mentioning
confidence: 99%
“…It is unclear how many of the browserimplemented reinforcements for HTTPS are adopted in DoT, and how the relatively lax security in DoT affects issued certificates. For example, successful authentication [3] and encryption are unnecessary in DoT depending on the client's configured usage profile. If a client software is configured to use opportunistic usage profile [49], analogous to opportunistic encryption, the client only enforces security properties when possible.…”
Section: Dot and Https Certificate Ecosystemsmentioning
confidence: 99%
“…In April 2018, Cloudflare implemented hidden DNS-over-Tor (DoTor) resolver. 3 DoTor hides DNS messages with layers of encryption that enhances the privacy of the client against the recursive-resolver and Stage-1 entities (i.e., ISP, ASes) [34]. Thus, ISPs cannot distinguish DNS traffic, nor correlate it to reveal requested domain names.…”
Section: Doh Is Resilient-to-manipulation-in-mentioning
confidence: 99%
“…E1 and E2 suggest the advice is intended to be high-level and focused on outcomes, but in E1, also good practice. 7 E3 mentions that the advice should be technical controls and organizational policies. The former (technical controls) suggests a greater level of detail when compared to the DCMS guidelines, but not as specific as to suggest technical specification, which they again defer to more detailed documentation elsewhere (E5).…”
Section: Etsi Baseline Requirements Positioningmentioning
confidence: 99%
“…Mimicry-resistance is a term used to describe something about a user or device (e.g., behavior, data) that is resistant to being impersonated by an attacker [7]. Ray et al [171] use behavioral fingerprinting as mimicry-resistant identities for devices.…”
Section: Challenges Adapting Ioc Authentication Approaches For Iotmentioning
confidence: 99%