Security and Privacy Failures in Popular 2FA Apps.
Conor GilsenanFuzail ShakirNoura AlomarSerge EgelmanPublished in: USENIX Security Symposium (2023)
Keyphrases
- security issues
- statistical databases
- security concerns
- security and privacy issues
- privacy preserving
- security mechanisms
- information security
- data security
- personal data
- sensitive data
- security risks
- preserving privacy
- privacy issues
- privacy concerns
- security services
- secure multiparty computation
- security properties
- access control
- privacy requirements
- security measures
- security requirements
- data privacy
- identity management
- rfid systems
- biometric template
- personal information
- confidential information
- security problems
- individual privacy
- protection mechanisms
- network security
- privacy enhancing
- homomorphic encryption
- authentication protocol
- privacy preserving data mining
- cloud computing
- data confidentiality
- mutual authentication
- security threats
- security analysis
- security policies
- intrusion detection
- trusted third party
- privacy preservation
- sensitive information
- data sharing
- outsourced databases
- user privacy
- security management
- private information
- electronic payment
- encryption key
- mobile applications
- anomaly detection