2014
DOI: 10.1007/978-3-662-45472-5_24
|View full text |Cite
|
Sign up to set email alerts
|

On the (In)Security of Mobile Two-Factor Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(47 citation statements)
references
References 12 publications
0
45
0
2
Order By: Relevance
“…Google Authenticator (GA) is mobile software that generates offline authentication codes that are used as a second authentication token; such that when the user access his account, he is requested to enter the generated code in addition to his credentials. Dmitrienko et al [18] performed a security analysis that concluded that such schemes are vulnerable to attacks especially in the registration phase; a PC standing malware can intercept the QR code that encapsulates the pre-shared secrets, then the attacker can initialize his own version of GA and thus being able to generate valid authentication codes for the compromised account. Czeskis et al proposed PhoneAuth [19], a 2FA scheme in which the user mobile is considered a second authentication factor in addition to the user credentials; the user is authenticated after signing the login ticket (generated by the server) with the client private key that resides in the user' mobile.…”
Section: Related Workmentioning
confidence: 99%
“…Google Authenticator (GA) is mobile software that generates offline authentication codes that are used as a second authentication token; such that when the user access his account, he is requested to enter the generated code in addition to his credentials. Dmitrienko et al [18] performed a security analysis that concluded that such schemes are vulnerable to attacks especially in the registration phase; a PC standing malware can intercept the QR code that encapsulates the pre-shared secrets, then the attacker can initialize his own version of GA and thus being able to generate valid authentication codes for the compromised account. Czeskis et al proposed PhoneAuth [19], a 2FA scheme in which the user mobile is considered a second authentication factor in addition to the user credentials; the user is authenticated after signing the login ticket (generated by the server) with the client private key that resides in the user' mobile.…”
Section: Related Workmentioning
confidence: 99%
“…Тем не менее злоумышленниками разрабатываются новые программы, позволяющие обходить эти защитные меры. Примером является вредоносная программа ZitMo (Zeus-in-the-MObile), способная обходить двухфак-торную проверку подлинности [2].…”
Section: ключевые слова: мобильная безопасность моделирование атак unclassified
“…Тем не менее злоумышленниками разрабатываются новые программы, позволяющие обходить эти защитные меры. Примером является вредоносная программа ZitMo (Zeus-in-the-MObile), способная обходить двухфак-торную проверку подлинности [2].Для оценивания риска мобильных банковских атак необходимы аналитические модели, позволяющие исследовать вероятностные параметры атак. Среди различных подходов к по-строению вероятностных моделей атак в последнее время все большую популярность приоб-ретает метод, основанный на преобразовании стохастических сетей [3], отличающийся высо-кой точностью и устойчивостью.…”
unclassified
“…Mulliner et al [22] have contented that SMS OTP schemes cannot be considered to be secure, as researchers have shown several successful attacks against Global System for Mobile Communications (GSM) and 3G networks [1,12,19]. Furthermore, it has been argued that two, or three, factor authentication does not overcome man-in-the-middle and Trojan attacks [10,26,27]. This paper investigates the challenging problem of user authentication and transaction verification on an untrusted computer or device.…”
Section: Introductionmentioning
confidence: 99%