The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio
Association for Computing Machinery (ACM) via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities of ambient audio-based two-factor authentication in this conference talk presented at CCS 2016. Delve into the traditional two-factor authentication methods before examining the Sound-Proof system and its potential weaknesses. Analyze the threat model, architecture, and attack details of Sound-Proof, including parameterization for attack evaluation and success rates. Investigate real-world attack strategies and witness a practical demonstration. Conclude by discussing potential mitigation techniques to enhance the security of ambient audio-based authentication systems.
Syllabus
Intro
Outline
Traditional Two Factor Authentication
Sound-Proof Two Factor Authentication
Security of Sound-Proof
Threat Model
Sound-Proof Architecture
Attack Details
Parameterization for Attack Evaluation
Attack Success Rate
Real World Attack Strategy
A Real World Attack
Potential Mitigation
Taught by
ACM CCS