Social Engineering Resistant 2FA

Attackers increasingly, and with high success rates, use social engineering techniques to circumvent second factor authentication (2FA) technologies, compromise user accounts and sidestep fraud detection technologies. We introduce a social engineering resistant approach that we term device-aware 2FA...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Author Jakobsson, Markus
Format Paper
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 16.01.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Attackers increasingly, and with high success rates, use social engineering techniques to circumvent second factor authentication (2FA) technologies, compromise user accounts and sidestep fraud detection technologies. We introduce a social engineering resistant approach that we term device-aware 2FA, to replace the use of traditional security codes.
ISSN:2331-8422