[go: up one dir, main page]

Mahdad et al., 2024 - Google Patents

Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge

Mahdad et al., 2024

Document ID
18250539891711337232
Author
Mahdad A
Saxena N
Publication year
Publication venue
2024 21st Annual International Conference on Privacy, Security and Trust (PST)

External Links

Snippet

Smartphones have become ubiquitous for a range of social, financial, and personal endeavors, as well as for accessing sensitive resources like confidential files from organizations. Nevertheless, this extensive usage has also made smartphones vulnerable to …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Xiao et al. Edge computing security: State of the art and challenges
Tian et al. SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C
US9473485B2 (en) Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
Khan et al. Survey on mobile user's data privacy threats and defense mechanisms
Mannan et al. Leveraging personal devices for stronger password authentication from untrusted computers
Zaidi et al. A survey on security for smartphone device
Hur et al. A survey on security issues, vulnerabilities and attacks in Android based smartphone
Kuchhal et al. Evaluating the security posture of real-world fido2 deployments
Erinle et al. Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets
Konoth et al. Securepay: Strengthening two-factor authentication for arbitrary transactions
Bai et al. All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
Falade et al. Vulnerability analysis of digital banks' mobile applications
Luvanda Identifying threats associated with man-in-the-middle attacks during communication between a mobile device and the back end server in mobile banking applications
Tong et al. Guardroid: A trusted path for password entry
Mahdad et al. Breaching security keys without root: Fido2 deception attacks via overlays exploiting limited display authenticators
Cheng et al. Per-user network access control kernel module with secure multifactor authentication.
Gujar Face-to-Face (F2F) Auth: A Multi-Party Environmental Authentication System for Sensitive Operations
Gowda et al. Data breach as a threat in the banking sector and steps to avoid it
Zhao et al. An overview of mobile devices security issues and countermeasures
Woschek Owasp cheat sheets
Xu et al. Security enhancement of secure USB debugging in Android system
Mahdad et al. Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge
Ezirim et al. Trusted platform module–a survey
Mahdad et al. Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices
Kumawat et al. Ethical hacking: White hat hackers