Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359828
|View full text |Cite
|
Sign up to set email alerts
|

An empirical study of SMS one-time password authentication in Android apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
16
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 33 publications
0
16
0
1
Order By: Relevance
“…Also, during Step 5, the generated OTP needs to be compared against the one provided by the app. These security properties have been previously studied and discussed [51] and found to be violated in some apps' implementations [45].…”
Section: B Sms-based 1-factor-authentication Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…Also, during Step 5, the generated OTP needs to be compared against the one provided by the app. These security properties have been previously studied and discussed [51] and found to be violated in some apps' implementations [45].…”
Section: B Sms-based 1-factor-authentication Schemesmentioning
confidence: 99%
“…Specifically, AUTH-EYE [45] shows that, in many cases, the SMS OTP is generated incorrectly (e.g., insufficient OTP randomness or insufficient OTP length), or that the OTP code is incorrectly verified (e.g., too many allowed retry attempts or too long renewal interval). Our work is complementary to AUTH-EYE.…”
Section: B Sms-based 1-factor-authentication Schemesmentioning
confidence: 99%
See 3 more Smart Citations