" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …

A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components

G Baldini, G Steri - IEEE Communications Surveys & Tutorials, 2017 - ieeexplore.ieee.org
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …

" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications

M Golla, M Wei, J Hainline, L Filipe… - Proceedings of the …, 2018 - dl.acm.org
Password reuse is widespread, so a breach of one provider's password database threatens
accounts on other providers. When companies find stolen credentials on the black market …

Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems

A Roy, N Memon, A Ross - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
This paper investigates the security of partial fingerprint-based authentication systems,
especially when multiple fingerprints of a user are enrolled. A number of consumer …

Practicality of accelerometer side channels on smartphones

AJ Aviv, B Sapp, M Blaze, JM Smith - Proceedings of the 28th annual …, 2012 - dl.acm.org
Modern smartphones are equipped with a plethora of sensors that enable a wide range of
interactions, but some of these sensors can be employed as a side channel to surreptitiously …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …

Active behavioral fingerprinting of wireless devices

S Bratus, C Cornelius, D Kotz, D Peebles - Proceedings of the first ACM …, 2008 - dl.acm.org
We propose a simple active method for discovering facts about the chipset, the firmware or
the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a …

I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics

C Giuffrida, K Majdanik, M Conti, H Bos - … 2014, Egham, UK, July 10-11 …, 2014 - Springer
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …

Beyond the pin: Enhancing user authentication for mobile devices

S Furnell, N Clarke, S Karatzouni - Computer fraud & security, 2008 - Elsevier
There is now an increasing need for an enhanced level of user authentication on mobile
devices. In this article, Steven Furnell, Nathan Clarke and Sevasti Karazouni begin by …

Exploiting data-usage statistics for website fingerprinting attacks on Android

R Spreitzer, S Griesmayr, T Korak… - Proceedings of the 9th …, 2016 - dl.acm.org
The browsing behavior of a user allows to infer personal details, such as health status,
political interests, sexual orientation, etc. In order to protect this sensitive information and to …