Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio

Association for Computing Machinery (ACM) via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities of ambient audio-based two-factor authentication in this conference talk presented at CCS 2016. Delve into the traditional two-factor authentication methods before examining the Sound-Proof system and its potential weaknesses. Analyze the threat model, architecture, and attack details of Sound-Proof, including parameterization for attack evaluation and success rates. Investigate real-world attack strategies and witness a practical demonstration. Conclude by discussing potential mitigation techniques to enhance the security of ambient audio-based authentication systems.

Syllabus

Intro
Outline
Traditional Two Factor Authentication
Sound-Proof Two Factor Authentication
Security of Sound-Proof
Threat Model
Sound-Proof Architecture
Attack Details
Parameterization for Attack Evaluation
Attack Success Rate
Real World Attack Strategy
A Real World Attack
Potential Mitigation

Taught by

ACM CCS

Reviews

Start your review of The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.