2021
DOI: 10.1007/978-3-030-80825-9_1
|View full text |Cite
|
Sign up to set email alerts
|

You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Finally, pre-hijacking attacks such as the Unexpired Email Change Attack show the importance of capability URLs. Further research is needed on the types of capability URLs in use, their typical validity periods, and the ways in which they might be abused (e.g., [21]).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, pre-hijacking attacks such as the Unexpired Email Change Attack show the importance of capability URLs. Further research is needed on the types of capability URLs in use, their typical validity periods, and the ways in which they might be abused (e.g., [21]).…”
Section: Discussionmentioning
confidence: 99%
“…Zeller et al [42] present an attack in which the attacker associates their own email address to the victim's account and takes control of the account by requesting a password reset link to be sent to the attacker's email address. Similarly, Innocenti et al [21] discusses attacks based on the password-reset URLs and Lee et al [23] presents the scenario where an attacker owns the recycled phone number of the victim to hijack the accounts of the victim through SMS-based password reset. Although the threat model considered in these works are different from ours, they inspired our Unexpired Email Change and Trojan Identifier Attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Note that phone calls are susceptible to phishing attacks [3]. Thus, email can also be considered the more secure communication channel [41] unless dealing with financial institutions or when critical information is exchanged where a high level of security is necessary, e.g., in-person or physically mailing to the user address. In addition, we considered security verification checks that can be a second step to confirm the user's identity to restore an account.…”
Section: Account Deletion Recovery and Restorationmentioning
confidence: 99%
“…Prior work on account recovery mechanisms investigated different authentication schemes [64], [65] and password reset strategies [66]. Password recovery schemes may also be vulnerable to manin-the-middle (MitM) attacks [67], [68], [69]. Liu et al [70] focus on user information security after account deletion, but this falls outside the scope of remediation that we are addressing.…”
Section: Related Workmentioning
confidence: 99%