RLAuth: A risk-based authentication system using reinforcement learning

C Picard, S Pierre - IEEE Access, 2023 - ieeexplore.ieee.org
Conventional authentication systems, that are used to protect most modern mobile
applications, are faced with usability and security problems related to their static and one …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

A framework for analyzing authentication risks in account networks

D Pöhn, N Gruschka, L Ziegler, A Büttner - Computers & Security, 2023 - Elsevier
Our everyday life depends more and more on online services and, therefore, access to
related user accounts. The security of user accounts, again, is tied to the security of the …

Towards an improved taxonomy of attacks related to digital identities and identity management systems

D Pöhn, W Hommel - Security and Communication Networks, 2023 - Wiley Online Library
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …

A new digital signature primitive and its application in blockchain

X Zou, P Zeng - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, we propose a new digital signature primitive, called expander signature, and
discuss its application in blockchain. The most promising advantage of expander signature …

A user study of keystroke dynamics as second factor in web MFA

AA Wahab, D Hou, S Schuckers - … of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
As account compromises and malicious online attacks are on the rise, multi-factor
authentication (MFA) has been adopted to defend against these attacks. OTP and mobile …

Detecting Risky Authentication Using the OpenID Connect Token Exchange Time

AH Han, DH Lee - Sensors, 2023 - mdpi.com
With the rise in sophisticated cyber threats, traditional authentication methods are no longer
sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust …

Evaluation of real-world risk-based authentication at online services revisited: complexity wins

JP Makowski, D Pöhn - … of the 18th International Conference on …, 2023 - dl.acm.org
Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen
or otherwise guessed passwords without requiring a second authentication method all the …

AI-URG: Account Identity-Based Uncertain Graph Framework for Fraud Detection

YW Chang, HY Shih, TN Lin - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cybercriminals controlling multiple accounts to conduct malicious activities are a threat to
the security of online services. These accounts form malicious communities that are difficult …

Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example

V Unsel, S Wiefling, N Gruschka… - Proceedings of the …, 2023 - dl.acm.org
Online services have difficulties to replace passwords with more secure user authentication
mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that …