Mahdad et al., 2024 - Google Patents
Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug BridgeMahdad et al., 2024
- Document ID
- 18250539891711337232
- Author
- Mahdad A
- Saxena N
- Publication year
- Publication venue
- 2024 21st Annual International Conference on Privacy, Security and Trust (PST)
External Links
Snippet
Smartphones have become ubiquitous for a range of social, financial, and personal endeavors, as well as for accessing sensitive resources like confidential files from organizations. Nevertheless, this extensive usage has also made smartphones vulnerable to …
- 230000000694 effects 0 abstract description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiao et al. | Edge computing security: State of the art and challenges | |
Tian et al. | SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C | |
US9473485B2 (en) | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |
Khan et al. | Survey on mobile user's data privacy threats and defense mechanisms | |
Mannan et al. | Leveraging personal devices for stronger password authentication from untrusted computers | |
Zaidi et al. | A survey on security for smartphone device | |
Hur et al. | A survey on security issues, vulnerabilities and attacks in Android based smartphone | |
Kuchhal et al. | Evaluating the security posture of real-world fido2 deployments | |
Erinle et al. | Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets | |
Konoth et al. | Securepay: Strengthening two-factor authentication for arbitrary transactions | |
Bai et al. | All your sessions are belong to us: Investigating authenticator leakage through backup channels on android | |
Falade et al. | Vulnerability analysis of digital banks' mobile applications | |
Luvanda | Identifying threats associated with man-in-the-middle attacks during communication between a mobile device and the back end server in mobile banking applications | |
Tong et al. | Guardroid: A trusted path for password entry | |
Mahdad et al. | Breaching security keys without root: Fido2 deception attacks via overlays exploiting limited display authenticators | |
Cheng et al. | Per-user network access control kernel module with secure multifactor authentication. | |
Gujar | Face-to-Face (F2F) Auth: A Multi-Party Environmental Authentication System for Sensitive Operations | |
Gowda et al. | Data breach as a threat in the banking sector and steps to avoid it | |
Zhao et al. | An overview of mobile devices security issues and countermeasures | |
Woschek | Owasp cheat sheets | |
Xu et al. | Security enhancement of secure USB debugging in Android system | |
Mahdad et al. | Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge | |
Ezirim et al. | Trusted platform module–a survey | |
Mahdad et al. | Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices | |
Kumawat et al. | Ethical hacking: White hat hackers |