Proceedings of the 33rd Annual Computer Security Applications Conference 2017
DOI: 10.1145/3134600.3134615
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 17 publications
3
9
0
Order By: Relevance
“…To trigger the delivery of an SMS OTP message to the victim's device, we also assume that the attacker knows the phone number of the victim. This assumption is in-line with similar attacks performed in previous work [10]. There are a number of ways an attacker can obtain a victim's phone number.…”
Section: A Threat Modelsupporting
confidence: 81%
See 4 more Smart Citations
“…To trigger the delivery of an SMS OTP message to the victim's device, we also assume that the attacker knows the phone number of the victim. This assumption is in-line with similar attacks performed in previous work [10]. There are a number of ways an attacker can obtain a victim's phone number.…”
Section: A Threat Modelsupporting
confidence: 81%
“…These attacks consist of an adversary who controls a malicious app installed on a victim's mobile device. We note that this is a common threat model in the field of mobile security, in-line with prior works [9], [10], [49], [50], [64]. In fact, it is unfortunately feasible and practical for an attacker to include malicious functionality in a seemingly benign and useful app, and distribute it through app markets [34], [42].…”
Section: A Threat Modelsupporting
confidence: 69%
See 3 more Smart Citations