Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their ...
详细信息
Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their mobile device. However, these methods are vulnerable to "concurrency attacks," where an attacker attempts to log in immediately after the legitimate user, causing multiple push notifications that may lead to users inadvertently approving fraudulent access. This vulnerability arises because the login notifications are not uniquely bound to individual login attempts. To address this issue, Push-Compare-and-Confirm 2FA method enhances security by associating each login notification with a unique code displayed on both the authentication terminal and the push notification. Users are required to match these codes before confirming access, thereby binding the notification to a specific login attempt. Recognizing the ubiquity of mobile devices in daily life, we conducted a comprehensive user study with 65 participants to evaluate the usability and security of Push-Compare-and-Confirm. The study considered two scenarios: one where the user’s second-factor device (phone) is physically separate from the authentication terminal (e.g., logging in on a PC and confirming on the phone), and another where the phone serves as both the authentication terminal and the second-factor device. Participants completed 24 login trials, including both benign and attack scenarios, with varying code lengths (four characters and six characters). Our results indicate that while Push-Compare-and-Confirm maintains high usability in benign scenarios, with True Positive Rates (TPR) exceeding 95%, it presents significant challenges in attack detection. Participants correctly identified only about 50% of fraudulent login attempts, indicating a substantial vulnerability remains. These findings suggest that although Push-Compare-and-Confirm enhances security over standard push-based 2FA methods, addit
Federated learning (FL) has been shown vulnerable to a new class of adversarial attacks, known as model poisoning attacks (MPA), where one or more malicious clients try to poison the global model by sending carefully ...
详细信息
The advancement in technology leads to provide an efficient communication among vehicles to offload resource-intensive tasks for transportation-based services. However, it may cause issue related to efficient secure r...
详细信息
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
Images Quality in the Transportation industry is considered the most significant term and gains more attention among the higher authorities and researchers. Therefore, the accuracy level of the image has been evaluate...
详细信息
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb-Se-Te(GSST)rely on melt-quench and high temperature annealing processes to change the organization of the molecules in the materials’*** a reorganization leads to different optical,electrical,and thermal properties which can be exploited to implement photonic memory cells that are able to store the data at different resistance or optical transmission *** the great promise of conventional PCMs for realizing reconfigurable photonic memories,their slow and extremely power-hungry thermal mechanisms make scaling the systems based on such devices *** addition,such materials do not offer a stable multi-level response over a long period of *** address these shortcomings,the research carried out in this study shows the proof of concept to implement next-generation photonic memory cells based on two-dimensional(2D)birefringence PCMs such as SnSe,which offer anisotropic optical properties that can be switched *** demonstrate that by leveraging the ultrafast and low-power crystallographic direction change of the material,the optical polarization state of the input optical signal can be *** enables the implementation of next-generation high-speed polarization-encodable photonic memory cells for future photonic computing *** to the conventional PCMs,the proposed SnSe-based photonic memory cells offer an ultrafast switching and low-loss optical response relying on ferroelectric property of SnSe to encode the data on the polarization state of the input optical *** a polarization encoding scheme also reduces memory read-out errors and alleviates the scalability limitations due to the optical insertion loss often seen in optical transmission encoding.
Significant health hazards have been associated with the COVID-19 pandemic, especially for women, whose mental and physical health have suffered greatly. In order to predict the risk of COVID-19 in women, this study i...
详细信息
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol...
详细信息
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff...
详细信息
暂无评论