2017
DOI: 10.1007/978-3-662-54970-4_24
|View full text |Cite
|
Sign up to set email alerts
|

How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication

Abstract: General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.• Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…The second and possibly the most popular class of attacks on SMS-based 2FA observed in the wild use malware to steal verification codes and bypass the entire authentication process [16,36]. The first step of this type of attack is to install malware on a user's device, such as a PC or mobile phone.…”
Section: Attacks Against Sms-based 2famentioning
confidence: 99%
“…The second and possibly the most popular class of attacks on SMS-based 2FA observed in the wild use malware to steal verification codes and bypass the entire authentication process [16,36]. The first step of this type of attack is to install malware on a user's device, such as a PC or mobile phone.…”
Section: Attacks Against Sms-based 2famentioning
confidence: 99%
“…A one-time password or facial recognition system may also serve as a single factor for authentication [7]. SFAs are preferred because of their easy deployment [8,9]. However, passwords that are widely used as single-factor authentication provide what is considered a low level of security.…”
Section: Introductionmentioning
confidence: 99%
“…1 ). Traditional authenticated transactions like applying seals, wax seals are physical security systems ( Konoth, van der Veen & Bos, 2016 ). Sender-based information validation alone cannot provide standard authentication ( Ibrokhimov et al, 2019 ).…”
Section: Introductionmentioning
confidence: 99%