Corpus ID: 5610731

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound

@inproceedings{Karapanos2015SoundProofUT,
  title={Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound},
  author={N. Karapanos and Claudio Marforio and C. Soriente and S. Capkun},
  booktitle={USENIX Security Symposium},
  year={2015}
}
Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why two-factor authentication is so unpopular is the extra steps that the user must complete in order to log in. Currently deployed two-factor authentication mechanisms require the user to interact with his phone to, for example, copy a verification code to the browser. Two-factor authentication schemes that eliminate user-phone interaction exist… Expand
132 Citations
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
  • 5
T2FA: Transparent Two-Factor Authentication
  • 18
  • PDF
Leveraging bluetooth as a second factor in two-factor authentication
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings
  • 1
  • Highly Influenced
Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication
  • 10
  • Highly Influenced
  • PDF
Wi-Sign: Device-free Second Factor User Authentication
  • 4
Wi-Access: Second Factor User Authentication leveraging WiFi Signals
  • S. W. Shah, S. Kanhere
  • Computer Science
  • 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
  • 2018
  • 4
Context-aware multifactor authentication for the augmented human
  • 1
  • Highly Influenced
  • PDF
0EISUA: Zero Effort Indoor Secure User Authentication
  • 8
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 85 REFERENCES
Strengthening user authentication through opportunistic cryptographic identity assertions
  • 93
  • Highly Influential
  • PDF
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices
  • 36
  • Highly Influential
  • PDF
Two-factor authentication: is the world ready?: quantifying 2FA adoption
  • 57
  • PDF
Usable security: User preferences for authentication methods in eBanking and the effects of experience
  • 93
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications
  • 36
  • PDF
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
  • 62
  • PDF
User perceptions of security, convenience and usability for ebanking authentication tokens
  • 143
Secure Communication Based on Ambient Audio
  • 130
  • PDF
...
1
2
3
4
5
...