Главная
Study mode:
on
1
Intro
2
Outline
3
Traditional Two Factor Authentication
4
Sound-Proof Two Factor Authentication
5
Security of Sound-Proof
6
Threat Model
7
Sound-Proof Architecture
8
Attack Details
9
Parameterization for Attack Evaluation
10
Attack Success Rate
11
Real World Attack Strategy
12
A Real World Attack
13
Potential Mitigation
Description:
Explore the security vulnerabilities of ambient audio-based two-factor authentication in this conference talk presented at CCS 2016. Delve into the traditional two-factor authentication methods before examining the Sound-Proof system and its potential weaknesses. Analyze the threat model, architecture, and attack details of Sound-Proof, including parameterization for attack evaluation and success rates. Investigate real-world attack strategies and witness a practical demonstration. Conclude by discussing potential mitigation techniques to enhance the security of ambient audio-based authentication systems.

The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio

Association for Computing Machinery (ACM)
Add to list