Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing 2014
DOI: 10.1145/2660859.2660964
|View full text |Cite
|
Sign up to set email alerts
|

Securing User Input as a Defense Against MitB

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Konoth et al, describe how Google's 2FA implementation can be bypassed using a MitB attack on an untrusted device [25]. Dmitrienko et al, analysed 2FA implementations of major online service providers such as Google, Twitter, Dropbox and Facebook [16].…”
Section: Two-factor Authenticationmentioning
confidence: 99%
“…Konoth et al, describe how Google's 2FA implementation can be bypassed using a MitB attack on an untrusted device [25]. Dmitrienko et al, analysed 2FA implementations of major online service providers such as Google, Twitter, Dropbox and Facebook [16].…”
Section: Two-factor Authenticationmentioning
confidence: 99%