Ulqinaku et al., 2020 - Google Patents
Is Real-time Phishing Eliminated with FIDO?Ulqinaku et al., 2020
- Document ID
- 15386918792828149810
- Author
- Ulqinaku E
- Assal H
- Abdou A
- Chiasson S
- Capkun S
- Publication year
- Publication venue
- Proceedings of the 30th USENIX Security Symposium
External Links
Snippet
Is Real-time Phishing Eliminated with FIDO? Page 1 Is Real-time Phishing Eliminated with
FIDO? Social Engineering Downgrade Attacks against FIDO Protocols Enis Ulqinaku, Hala
Assal, AbdelRahman Abdou, Sonia Chiasson, and Srdjan Capkun Page 2 ‘00: Collect …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2819371B1 (en) | A computer implemented method to prevent attacks against authorization systems and computer programs products thereof | |
US8762731B2 (en) | Multi-system security integration | |
US9131382B1 (en) | Trusted user interface for mobile web applications | |
US10846432B2 (en) | Secure data leak detection | |
US8713644B2 (en) | System and method for providing security in browser-based access to smart cards | |
US8775818B2 (en) | Multifactor validation of requests to thwart dynamic cross-site attacks | |
US8689001B1 (en) | Method and system for protecting user identification information | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Xiao et al. | Differentiated virtual passwords, secret little functions, and codebooks for protecting users from password theft | |
Klevjer et al. | Extended HTTP digest access authentication | |
Ulqinaku et al. | Is Real-time Phishing Eliminated with FIDO? | |
Kassim et al. | Procurepass: A user authentication protocol to resist password stealing and password reuse attack | |
Hackenjos et al. | FIDO2 with two displays-Or how to protect security-critical web transactions against malware attacks | |
Blatz | Csrf: Attack and defense | |
Czeskis et al. | Protected login | |
Nagpal et al. | Preventive measures for securing web applications using broken authentication and session management attacks: A study | |
De Ryck et al. | Eradicating bearer tokens for session management | |
Dietz et al. | Hardening Persona-Improving Federated Web Login. | |
Aslam et al. | PwdIP-Hash: A lightweight solution to phishing and pharming attacks | |
Verbitskiy | Node. js security | |
Pavani | A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network | |
Hays et al. | Reducing Usefulness of Stolen Credentials in SSO Contexts | |
Wu | Authentication in Web Applications | |
ALnwihel et al. | A Novel Cloud Authentication Framework | |
Sood | Phishing Attacks: A Challenge Ahead |