Security Analysis of Mobile Two-Factor Authentication Schemes
暂无分享,去创建一个
Ahmad-Reza Sadeghi | Alexandra Dmitrienko | Christian Rossow | Christopher Liebchen | C. Rossow | A. Sadeghi | A. Dmitrienko | Christopher Liebchen
[1] Edward W. Felten,et al. Hand-Held Computers Can Be Better Smart Cards , 1999, USENIX Security Symposium.
[2] Srinivas Devadas,et al. The untrusted computer problem and camera based authentication using optical character recognition , 2002 .
[3] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[4] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[5] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[6] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[7] Paul C. van Oorschot,et al. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer , 2007, Financial Cryptography.
[8] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[9] Martin Mauve,et al. CLL: A Cryptographic Link Layer for Local Area Networks , 2008, SCN.
[10] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[11] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[12] Lorenz Froihofer,et al. QR-TAN: Secure Mobile Transaction Authentication , 2009, 2009 International Conference on Availability, Reliability and Security.
[13] Wassim El-Hajj,et al. Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[14] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[15] Angelos Stavrou,et al. Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.
[16] Peter Schartner,et al. Attacking mTAN-Applications like e-Banking and mobile Signatures , 2010 .
[17] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[18] Angelos D. Keromytis,et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization , 2012, 2012 IEEE Symposium on Security and Privacy.
[19] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.
[20] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[21] Jack W. Davidson,et al. ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[23] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.
[24] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[25] Jean-Pierre Seifert,et al. SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper) , 2013, DIMVA.
[26] Erik Poll,et al. Using Trusted Execution Environments in Two-factor Authentication: comparing approaches , 2013, Open Identity Summit.
[27] Dan Boneh,et al. Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.
[28] Wenke Lee,et al. From Zygote to Morula: Fortifying Weakened ASLR on Android , 2014, 2014 IEEE Symposium on Security and Privacy.
[29] F. Al-Shamali,et al. Author Biographies. , 2015, Journal of social work in disability & rehabilitation.
[30] Luca Faust,et al. Modern Operating Systems , 2016 .