Explore the security vulnerabilities of ambient audio-based two-factor authentication in this conference talk presented at CCS 2016. Delve into the traditional two-factor authentication methods before examining the Sound-Proof system and its potential weaknesses. Analyze the threat model, architecture, and attack details of Sound-Proof, including parameterization for attack evaluation and success rates. Investigate real-world attack strategies and witness a practical demonstration. Conclude by discussing potential mitigation techniques to enhance the security of ambient audio-based authentication systems.
The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio