The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313481
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Login Challenges as aDefense Against Account Takeover

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 12 publications
1
20
0
Order By: Relevance
“…none of them thinks they're going to be targeted for cybersecurity attacks." -A participant Account lockout is a real risk with 2FA [28]. However, it seemed that the population overestimated the likelihood or frequency of this happening, and underestimated the importance of using stronger account security protections given the threats they face.…”
Section: Accounts and Authenticationmentioning
confidence: 99%
“…none of them thinks they're going to be targeted for cybersecurity attacks." -A participant Account lockout is a real risk with 2FA [28]. However, it seemed that the population overestimated the likelihood or frequency of this happening, and underestimated the importance of using stronger account security protections given the threats they face.…”
Section: Accounts and Authenticationmentioning
confidence: 99%
“…We annotate each user with whether they have adopted some form of two-factor authentication (e.g., SMS, device prompts) for their Google account, or established an account recovery mechanism via a secondary email account or phone number. These features allow us to examine whether users who are aware of their elevated risk status adopt critical account hygiene protections that would help protect against phishing attacks and some malware [14].…”
Section: User Annotationsmentioning
confidence: 99%
“…Prior work has shown that phishing attacks often have a disparate impact on their targets, suggesting a need for personalizing defenses to protect the most at-risk users [9,46,51]. Such personalization becomes necessary since requiring additional defenses often means imposing additional usability costs on users [12,14,35]. Our study presents a first step towards designing a system that automatically identifies the subset of users requiring such heightened protections.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Doerfler et al [7] evaluated the effectiveness of Google's re-authentication challenges by analyzing login attempt data. Their results showed that code-based re-authentication protected against more than 90% of all phishing attempts.…”
Section: Related Workmentioning
confidence: 99%