Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings

E Bitsikas, T Schnitzler, C Pöpper… - 32nd USENIX Security …, 2023 - usenix.org
Short Message Service (SMS) remains one of the most popular communication channels
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …

App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector

A Aparicio, MM Martínez-González… - Wireless …, 2023 - Springer
Abstract Two Factor Authentication (2FA) using One Time Password (OTP) codes via SMS
messages is widely used. In order to improve user experience, Google has proposed APIs …

A framework for analyzing authentication risks in account networks

D Pöhn, N Gruschka, L Ziegler, A Büttner - Computers & Security, 2023 - Elsevier
Our everyday life depends more and more on online services and, therefore, access to
related user accounts. The security of user accounts, again, is tied to the security of the …

Device risk analysis protocol for SMS-based OTP Authentication

M Bartłomiejczyk, I El Fray - IEEE Access, 2024 - ieeexplore.ieee.org
Two-factor authentication (2FA) is widely recognized as a secure authentication method.
Despite the availability of multiple authentication methods, SMS one-time password (OTP) …

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

A Nash, H Studiawan, G Grispos, KKR Choo - International Conference on …, 2023 - Springer
As the use of authenticator applications for two-factor authentication (2FA) has become
increasingly common, there is a growing need to assess the security of these applications. In …

An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication

J Lee, HK Choi, JH Yoon, S Kim - IEEE Access, 2023 - ieeexplore.ieee.org
One of the most critical vulnerabilities in authentication, commonly referred to as “broken
authentication,” poses a harmful threat, leading to the compromise of user credentials and …

Amplifying Threats: The Role of {Multi-Sender} Coordination in {SMS-Timing-Based} Location Inference Attacks

E Bitsikas, T Schnitzler, C Pöpper… - 18th USENIX WOOT …, 2024 - usenix.org
SMS-timing-based location inference attacks leverage timing side channels to ascertain a
target's location. Prior work has primarily relied on a single-sender approach, employing …

One-Time Passwords: A Literary Review of Different Protocols and Their Applications

LE Almeida, BA Fernández, D Zambrano… - … on Advanced Research …, 2023 - Springer
Currently, user authentication only based on passwords can be inadequate due to different
types of vulnerabilities and attacks. To solve this problem, two-factor authentication is …