Finding flaws from password authentication code in Android apps
Password authentication is widely used to validate users’ identities because it is convenient to use, easy for users to remember, and simple to implement. The password authentication protocol transmits passwords in plaintext, which makes the authentication vulnerable to eavesdropping and replay atta...
Saved in:
Main Authors: | MA, Siqi, BERTINO, Elisa, NEPAL, Surya, LI, Jianru, DIETHELM, Ostry, DENG, Robert H., JHA, Sanjay |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4511 https://ink.library.smu.edu.sg/context/sis_research/article/5514/viewcontent/esorics19.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Orchestration or automation: Authentication flaw detection in Android apps
by: MA, Siqi, et al.
Published: (2022) -
n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
by: WAN, Zhiguo, et al.
Published: (2009) -
A new approach for anonymous password authentication
by: YANG, Yanjiang, et al.
Published: (2009) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012) -
Replay tolerance of authentication protocols
by: Lam, K.-Y.
Published: (2014)