Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …
breaches. To protect sustainability, websites' authentication procedures should continuously …
A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …
pervasiveness makes them a vital component of the activities involved in living in the …
Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings
Short Message Service (SMS) remains one of the most popular communication channels
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …
since its introduction in 2G cellular networks. In this paper, we demonstrate that merely …
App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector
A Aparicio, MM Martínez-González… - Wireless …, 2023 - Springer
Abstract Two Factor Authentication (2FA) using One Time Password (OTP) codes via SMS
messages is widely used. In order to improve user experience, Google has proposed APIs …
messages is widely used. In order to improve user experience, Google has proposed APIs …
A framework for analyzing authentication risks in account networks
Our everyday life depends more and more on online services and, therefore, access to
related user accounts. The security of user accounts, again, is tied to the security of the …
related user accounts. The security of user accounts, again, is tied to the security of the …
Device risk analysis protocol for SMS-based OTP Authentication
M Bartłomiejczyk, I El Fray - IEEE Access, 2024 - ieeexplore.ieee.org
Two-factor authentication (2FA) is widely recognized as a secure authentication method.
Despite the availability of multiple authentication methods, SMS one-time password (OTP) …
Despite the availability of multiple authentication methods, SMS one-time password (OTP) …
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy
As the use of authenticator applications for two-factor authentication (2FA) has become
increasingly common, there is a growing need to assess the security of these applications. In …
increasingly common, there is a growing need to assess the security of these applications. In …
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication
J Lee, HK Choi, JH Yoon, S Kim - IEEE Access, 2023 - ieeexplore.ieee.org
One of the most critical vulnerabilities in authentication, commonly referred to as “broken
authentication,” poses a harmful threat, leading to the compromise of user credentials and …
authentication,” poses a harmful threat, leading to the compromise of user credentials and …
Amplifying Threats: The Role of {Multi-Sender} Coordination in {SMS-Timing-Based} Location Inference Attacks
SMS-timing-based location inference attacks leverage timing side channels to ascertain a
target's location. Prior work has primarily relied on a single-sender approach, employing …
target's location. Prior work has primarily relied on a single-sender approach, employing …
One-Time Passwords: A Literary Review of Different Protocols and Their Applications
LE Almeida, BA Fernández, D Zambrano… - … on Advanced Research …, 2023 - Springer
Currently, user authentication only based on passwords can be inadequate due to different
types of vulnerabilities and attacks. To solve this problem, two-factor authentication is …
types of vulnerabilities and attacks. To solve this problem, two-factor authentication is …