2007
DOI: 10.1007/978-3-540-77366-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

Abstract: Abstract. Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typicall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
55
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 83 publications
(56 citation statements)
references
References 11 publications
0
55
0
1
Order By: Relevance
“…In [18], the authors discussed an empirical design called MP-Auth which uses mobile phones to protect online banking. Without any use of hardware supports, it is regarded as a typical example of using PKI in mobile payment.…”
Section: Other Solutionsmentioning
confidence: 99%
“…In [18], the authors discussed an empirical design called MP-Auth which uses mobile phones to protect online banking. Without any use of hardware supports, it is regarded as a typical example of using PKI in mobile payment.…”
Section: Other Solutionsmentioning
confidence: 99%
“…However, the idea of using a personal (mobile) device to improve security in practice has been studied in several previous papers. In [18], Parno et al use a mobile phone to set up secure SSL/TLS connections and in [15], Mannan and Oorschot use a personal device to improve security of password authentication. Both solutions basically aim to do user authentication with improved security, in particular to protect against key-logging and phising.…”
Section: Related Workmentioning
confidence: 99%
“…All communication between the used PC and the server is routed through this trusted device, where the user has to accept sensitive transactions. [15,20] also contains a good overview of other existing anti-phising techniques and their properties. Finally, there are many examples of using secure devices for transaction authentication, see [2,13], for instance.…”
Section: Related Workmentioning
confidence: 99%
“…Mannan and van Oorschot [21] propose an authentication protocol involving an independent personal device, and survey related schemes.…”
Section: Idf Detection Via Location Corroboration and Personal Devicesmentioning
confidence: 99%