Login / Signup

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.

Mohammed JuburPrakash ShresthaNitesh SaxenaJay Prakash
Published in: AsiaCCS (2021)
Keyphrases
  • case study
  • social networks
  • human interaction
  • database
  • information retrieval
  • artificial intelligence
  • human subjects
  • factor analysis
  • security analysis