Social Engineering Resistant 2FA
Abstract
Attackers increasingly, and with high success rates, use social engineering techniques to circumvent second factor authentication (2FA) technologies, compromise user accounts and sidestep fraud detection technologies. We introduce a social engineering resistant approach that we term device-aware 2FA, to replace the use of traditional security codes.
- Publication:
-
arXiv e-prints
- Pub Date:
- January 2020
- DOI:
- 10.48550/arXiv.2001.06075
- arXiv:
- arXiv:2001.06075
- Bibcode:
- 2020arXiv200106075J
- Keywords:
-
- Computer Science - Cryptography and Security;
- D.4.6
- E-Print:
- 5 pages, 8 figures