Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660317
|View full text |Cite
|
Sign up to set email alerts
|

Faces in the Distorting Mirror

Abstract: In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called social authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition software. Here we demonstrate an alternative attack that employs image comparison techniques to identify the SA photos within an offline collection of the users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 18 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…However, deep learning models can solve Google's No CAPTCHA reCAPTCHA [61]. Polakis et al [48] present a scheme using an image selection and modification mechanism based on Facebook's social authentication to boost security. Human face photos that are indistinct, obstructed, or from the rear side are used as features in this technique to protect against malicious bot efforts.…”
Section: Generic Image-based Captchasmentioning
confidence: 99%
“…However, deep learning models can solve Google's No CAPTCHA reCAPTCHA [61]. Polakis et al [48] present a scheme using an image selection and modification mechanism based on Facebook's social authentication to boost security. Human face photos that are indistinct, obstructed, or from the rear side are used as features in this technique to protect against malicious bot efforts.…”
Section: Generic Image-based Captchasmentioning
confidence: 99%