pith. the verified trust layer for science. sign in

arxiv: 1708.01706 · v2 · pith:KVEI43VAnew · submitted 2017-08-05 · 💻 cs.CR

Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes

classification 💻 cs.CR
keywords authenticationmimicry-resistanceschemesdifferentframeworkinvisiblemechanismssome
0
0 comments X p. Extension
Add this Pith Number to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{KVEI43VA}

Prints a linked pith:KVEI43VA badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance dimension. We analyze web authentication mechanisms with respect to new usability and security properties related to mimicry-resistance (augmenting the UDS framework), and in particular evaluate invisible techniques (those requiring neither user actions, nor awareness) that provide some mimicry-resistance (unlike those relying solely on static secrets), including device fingerprinting schemes, PUFs (physically unclonable functions), and a subset of Internet geolocation mechanisms.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.