Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

SR-PEKS: Subversion-resistant public key encryption with keyword search

C Jiang, C Xu, Z Zhang, K Chen - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …

Token meets wallet: Formalizing privacy and revocation for FIDO2

L Hanzlik, J Loss, B Wagner - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The FIDO2 standard is a widely-used class of challenge-response type protocols that allows
to authenticate to an online service using a hardware token. Barbosa et al.(CRYPTO '21) …

A secure two-factor authentication scheme from password-protected hardware tokens

S Li, C Xu, Y Zhang, J Zhou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
We investigate existing “password+ hardware token”-based authentication schemes
deployed in real-world applications and observe that they are vulnerable to critical threats …

How not to handle keys: Timing attacks on FIDO authenticator privacy

M Kepkowski, L Hanzlik, I Wood, MA Kaafar - arxiv preprint arxiv …, 2022 - arxiv.org
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication
protocol that allows attackers to link user accounts stored in vulnerable authenticators, a …

A security and usability analysis of local attacks against fido2

TK Yadav, K Seamons - arxiv preprint arxiv:2308.02973, 2023 - arxiv.org
The FIDO2 protocol aims to strengthen or replace password authentication using public-key
cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote …

Notary: A device for secure transaction approval

A Athalye, A Belay, MF Kaashoek, R Morris… - Proceedings of the 27th …, 2019 - dl.acm.org
Notary is a new hardware and software architecture for running isolated approval agents in
the form factor of a USB stick with a small display and buttons. Approval agents allow …

On the usability of authenticity checks for hardware security tokens

K Pfeffer, A Mai, A Dabrowski, M Gusenbauer… - 30th USENIX Security …, 2021 - usenix.org
The final responsibility to verify whether a newly purchased hardware security token (HST) is
authentic and unmodified lies with the end user. However, recently reported attacks on such …

Reverse firewalls for adaptively secure MPC without setup

S Chakraborty, C Ganesh, M Pancholi… - … Conference on the Theory …, 2021 - Springer
We study Multi-party computation (MPC) in the setting of subversion, where the adversary
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …