Login / Signup

Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.

Supraja BaskaranLianying ZhaoMohammad MannanAmr M. Youssef
Published in: CoRR (2023)
Keyphrases
  • data mining
  • neural network
  • biometric authentication
  • decision trees
  • security mechanisms