" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …
A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …
devices through their physical components and properties, both from a theoretical point of …
" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
Password reuse is widespread, so a breach of one provider's password database threatens
accounts on other providers. When companies find stolen credentials on the black market …
accounts on other providers. When companies find stolen credentials on the black market …
Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems
This paper investigates the security of partial fingerprint-based authentication systems,
especially when multiple fingerprints of a user are enrolled. A number of consumer …
especially when multiple fingerprints of a user are enrolled. A number of consumer …
Practicality of accelerometer side channels on smartphones
Modern smartphones are equipped with a plethora of sensors that enable a wide range of
interactions, but some of these sensors can be employed as a side channel to surreptitiously …
interactions, but some of these sensors can be employed as a side channel to surreptitiously …
An {Administrator's} Guide to Internet Password Research
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …
securing web-facing services or setting policies. With a view to improving this situation we …
Active behavioral fingerprinting of wireless devices
We propose a simple active method for discovering facts about the chipset, the firmware or
the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a …
the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a …
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …
more confidential user information. Their portable nature and the great exposure to security …
Beyond the pin: Enhancing user authentication for mobile devices
There is now an increasing need for an enhanced level of user authentication on mobile
devices. In this article, Steven Furnell, Nathan Clarke and Sevasti Karazouni begin by …
devices. In this article, Steven Furnell, Nathan Clarke and Sevasti Karazouni begin by …
Exploiting data-usage statistics for website fingerprinting attacks on Android
R Spreitzer, S Griesmayr, T Korak… - Proceedings of the 9th …, 2016 - dl.acm.org
The browsing behavior of a user allows to infer personal details, such as health status,
political interests, sexual orientation, etc. In order to protect this sensitive information and to …
political interests, sexual orientation, etc. In order to protect this sensitive information and to …