I'm spartacus, no, i'm spartacus: Proactively protecting users from phishing by intentionally triggering cloaking behavior

P Zhang, Z Sun, S Kyung, HW Behrens… - Proceedings of the …, 2022 - dl.acm.org
Phishing is a ubiquitous and increasingly sophisticated online threat. To evade mitigations,
phishers try to" cloak" malicious content from defenders to delay their appearance on …

A study of {Multi-Factor} and {Risk-Based} authentication availability

A Gavazzi, R Williams, E Kirda, L Lu, A King… - 32nd USENIX Security …, 2023 - usenix.org
Password-based authentication (PBA) remains the most popular form of user authentication
on the web despite its long-understood insecurity. Given the deficiencies of PBA, many …

Evaluation of real-world risk-based authentication at online services revisited: complexity wins

JP Makowski, D Pöhn - … of the 18th International Conference on …, 2023 - dl.acm.org
Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen
or otherwise guessed passwords without requiring a second authentication method all the …

A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web

S Wiefling, M Hönscheid, L Lo Iacono - Proceedings of the 19th …, 2024 - dl.acm.org
HTTP client hints are a set of standardized HTTP request headers designed to modernize
and potentially replace the traditional user agent string. While the user agent string exposes …

[PDF][PDF] Usability, security, and privacy of risk-based authentication

S Wiefling - 2023 - researchgate.net
Weaknesses in password-based authentication have always shaken password security,
especially with the rise of data breaches. Credential stuffing and password spraying attacks …

[PDF][PDF] Measuring the Accessibility of Popular Websites While Using Mullvad VPN

FB do Nascimento, S Roos - … from http://resolver. tudelft. nl/uuid …, 2021 - repository.tudelft.nl
There are many valid reasons for someone to choose to stay anonymous online, not least of
which is the fact that online privacy is a human right. However, discrimination against users …

Application to demonstrate Client-Side Vulnerabilities in Capture-The-Flag Competitions

R Yaswant, TV Chandran, V Sahithi… - … on Trends in …, 2022 - ieeexplore.ieee.org
Capture-The-Flag is a cybersecurity competition that has intentionally-vulnerable programs
for players to exploit. For Client-Side Web-Exploitation challenges, the exploitation happens …

Detection and Prevention of Sophisticated Cyberattacks

P Zhang - 2022 - search.proquest.com
Despite extensive research by the security community, cyberattacks such as phishing and
Internet of Things (IoT) attacks remain profitable to criminals and continue to cause …

Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung

S Wiefling - 2020 - epb.bibl.th-koeln.de
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung
passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und …

[PDF][PDF] Usability, Sicherheit und Privatsphäre von risikobasierter AuthentiĄzierung

D Reinhardt, H Langweg, M Fischer - researchgate.net
Risikobasierte AuthentiĄzierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur
Stärkung passwortbasierter AuthentiĄzierung. Sie zeichnet Merkmale während des Logins …