Proceedings of the Eighth European Workshop on System Security 2015
DOI: 10.1145/2751323.2751329
|View full text |Cite
|
Sign up to set email alerts
|

Mobile device fingerprinting considered harmful for risk-based authentication

Abstract: In this paper, we present a critical assessment of the use of device fingerprinting for risk-based authentication in a state-of-practice identity and access management system. Risk-based authentication automatically elevates the level of authentication whenever a particular risk threshold is exceeded. Contemporary identity and access management systems frequently leverage browser-based device fingerprints to recognize trusted devices of a certain individual. We analyzed the variability and the predictability o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
39
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(44 citation statements)
references
References 17 publications
4
39
0
Order By: Relevance
“…Ope-nAM offers device fingerprinting and matching capabilities using client-side and server-side JavaScript technology. As shown in our previous work [26], the built-in fingerprinting code is not well suited for mobile devices. In this work, we adapted the JavaScript code to call our service to process battery data.…”
Section: Mobile Information Systemsmentioning
confidence: 92%
“…Ope-nAM offers device fingerprinting and matching capabilities using client-side and server-side JavaScript technology. As shown in our previous work [26], the built-in fingerprinting code is not well suited for mobile devices. In this work, we adapted the JavaScript code to call our service to process battery data.…”
Section: Mobile Information Systemsmentioning
confidence: 92%
“…However, Apple ceased the use of UDID since iOS 6 [4] and for Android accessing IMEI requires explicit user permission [3]. Moreover, due to constrained hardware and software environments, existing methods often lack in precision for smartphones, as shown by recent studies [22,36]. However, Laperdrix et al have shown that it is in fact possible to fingerprint smartphones effectively through the user-agent string which is becoming richer every day due to the numerous vendors deploying different firmware versions [25].…”
Section: Browser Fingerprintingmentioning
confidence: 99%
“…In turn, advertisers have started using browser fingerprinting [9,19,29] to track users across the web without the use of cookies. As the battleground shifts to mobile platforms, which are quickly becoming the dominant mode for web browsing [1,5,6,8], existing fingerprinting techniques become less effective [22,36]; at the same time, new threats emerge: mobile browsers give web pages access to internal motion sensors (accelerometers and gyroscopes) and researchers have showed that imperfections in these sensors can be used to fingerprint smartphones [16,18,22], boosting the accuracy of a weakened browser fingerprint.…”
Section: Introductionmentioning
confidence: 99%
“…In the current version, the detection is based user entered detection rules. A future avenue for development would be to use the Fingerbank database [26], accessible at http://www.fingerbank.org, or similar. This is a device database with MAC address and User-Agent device detection.…”
Section: Future Workmentioning
confidence: 99%