Phish in sheep's clothing: Exploring the authentication pitfalls of browser fingerprinting

X Lin, P Ilia, S Solanki, J Polakis - 31st USENIX Security Symposium …, 2022 - usenix.org
As users navigate the web they face a multitude of threats; among them, attacks that result in
account compromise can be particularly devastating. In a world fraught with data breaches …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service

S Wiefling, PR Jørgensen, S Thunem… - ACM Transactions on …, 2022 - dl.acm.org
Risk-based authentication (RBA) aims to protect users against attacks involving stolen
passwords. RBA monitors features during login, and requests re-authentication when …

A Study of {Multi-Factor} and {Risk-Based} Authentication Availability

A Gavazzi, R Williams, E Kirda, L Lu, A King… - 32nd USENIX Security …, 2023 - usenix.org
Password-based authentication (PBA) remains the most popular form of user authentication
on the web despite its long-understood insecurity. Given the deficiencies of PBA, many …

Evaluation of account recovery strategies with FIDO2-based passwordless authentication

J Kunke, S Wiefling, M Ullmann, LL Iacono - arXiv preprint arXiv …, 2021 - arxiv.org
Threats to passwords are still very relevant due to attacks like phishing or credential stuffing.
One way to solve this problem is to remove passwords completely. User studies on …

Evaluating the Security Posture of Real-World FIDO2 Deployments

D Kuchhal, M Saad, A Oest, F Li - … of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
FIDO2 is a suite of protocols that combines the usability of local authentication (eg,
biometrics) with the security of public-key cryptography to deliver passwordless …

Account security interfaces: important, unintuitive, and untrustworthy

A Daffalla, M Bohuk, N Dell, R Bellini… - 32nd USENIX Security …, 2023 - usenix.org
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …

Verify it's you: how users perceive risk-based authentication

S Wiefling, M Dürmuth, LL Iacono - IEEE Security & Privacy, 2021 - ieeexplore.ieee.org
Risk-based authentication (RBA) is an adaptive security measure used to strengthen
password-based authentication against account takeover attacks. Our study on 65 …

" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication

P Markert, T Schnitzler, M Golla… - Eighteenth Symposium on …, 2022 - usenix.org
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …

Detecting Risky Authentication Using the OpenID Connect Token Exchange Time

AH Han, DH Lee - Sensors, 2023 - mdpi.com
With the rise in sophisticated cyber threats, traditional authentication methods are no longer
sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust …