D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of …
J Blocki, B Harsha, S Zhou - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
We develop an economic model of an offline password cracker which allows us to make quantitative predictions about the fraction of accounts that a rational password attacker …
To prevent password breaches and guessing attacks, banks increasingly turn to two-factor authentication (2FA), requiring users to present at least one more factor, such as a one-time …
The goal of the FIDO2 project is to provide secure and usable alternatives to password- based authentication on the Web. It relies on public-key credentials, which a user can …
S Ciolino, S Parkin, P Dunphy - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …
A Sasse - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Users will pay attention to reliable and credible indicators of risks they want to avoid. Security mechanisms with a high false positive rate undermine the credibility of security and …
Sasse is talking about ransomware: an extortion scheme in which hackers encrypt the data on a user's computer, then demand money for the digital key to unlock them. Victims get …
J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world provides some form of awareness or training, mostly bought from external vendors …
We report on a wearable digital diary study of 26 participants that explores people's daily authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …