YoVDO

The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cybersecurity Courses Two-Factor Authentication Courses Threat Models Courses

Course Description

Overview

Explore the security vulnerabilities of ambient audio-based two-factor authentication in this conference talk presented at CCS 2016. Delve into the traditional two-factor authentication methods before examining the Sound-Proof system and its potential weaknesses. Analyze the threat model, architecture, and attack details of Sound-Proof, including parameterization for attack evaluation and success rates. Investigate real-world attack strategies and witness a practical demonstration. Conclude by discussing potential mitigation techniques to enhance the security of ambient audio-based authentication systems.

Syllabus

Intro
Outline
Traditional Two Factor Authentication
Sound-Proof Two Factor Authentication
Security of Sound-Proof
Threat Model
Sound-Proof Architecture
Attack Details
Parameterization for Attack Evaluation
Attack Success Rate
Real World Attack Strategy
A Real World Attack
Potential Mitigation


Taught by

ACM CCS

Related Courses

Secure Software Development Fundamentals
Linux Foundation via edX
Security Literacy Course (How To)
Treehouse
Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples
Simons Institute via YouTube
Security Protection and Quality Control in Crowdsourcing
CAE in Cybersecurity Community via YouTube
Cross-App Poisoning in Software-Defined Networking
Association for Computing Machinery (ACM) via YouTube