Completed
Real World Attack Strategy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 Traditional Two Factor Authentication
- 4 Sound-Proof Two Factor Authentication
- 5 Security of Sound-Proof
- 6 Threat Model
- 7 Sound-Proof Architecture
- 8 Attack Details
- 9 Parameterization for Attack Evaluation
- 10 Attack Success Rate
- 11 Real World Attack Strategy
- 12 A Real World Attack
- 13 Potential Mitigation