CS858 - User Authentication - Fall 2022

Schedule & Reading List

Week 1 Sep 7
Introduction
Introduction to the Course
Week 2 Sep 12
Basics
Sep 14
Future Trends
Paper bids due Sep 11. Basics of User Authentication Recent Trends of User Authentication
Password Security: A Case History
Robert Morris, Ken Thompson [CACM 22/11]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano [Oakland'12]
Week 3 Sep 19
Guest Lectures
Sep 21
Advice
OneButtonPIN: A Single Button Authentication Method for Blind or Low Vision Users to Improve Accessibility and Prevent Eavesdropping
Manisha Varma Kamarushi, Stacey Watson, Garreth Tigwell, Roshan Peiris [MobileHCI'12]
Presentation Advice
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing
Jiayi Chen, Urs Hengartner, Hassan Khan [SOUPS'22]
Project Opportunities
Week 4 Sep 26
Passwords I
Sep 28
Passwords II
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-Strength, Minimum-Length, and Blocklist Requirements
Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor [CCS'20]
“The Same PIN, Just Longer”: On the (In)Security of Upgrading PINs from 4 to 6 Digits
Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv [USENIX Security'22]
Password policies of most top websites fail to follow best practices
Kevin Lee, Sten Sjöberg, Arvind Narayanan [SOUPS'22]
Gossamer: Securely Measuring Password-based Logins
Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael Swift, Thomas Ristenpart, Rahul Chatterjee [USENIX Security'22]
Week 5 Oct 3
Passwords III
Oct 5
Password Managers I
Let’s Hash: Helping Developers with Password Security
Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina [SOUPS'22]
Why Users (Don't) Use Password Managers at a Large Educational Institution
Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv [USENIX Security'22]
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations
Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han [CCS'21]
Do Password Managers Nudge Secure (Random) Passwords?
Samira Zibaei, Dinah Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, Julie Thorpe [SOUPS'22]
Week 6
No classes - Reading Week
Oct 10 Oct 12
Week 7 Oct 17
Password Managers II
Oct 19
Phishing
Project proposal due Oct 19. They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites
Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl [Oakland'21]
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
Daniele Lain, Kari Kostiainen, Srdjan Čapkun [Oakland'22]
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
Sean Oesch, Scott Ruoti [USENIX Security'20]
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting
Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis [USENIX Security'22]
Week 8 Oct 24
Two-Factor Authentication
Oct 26
FIDO2
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Kevin Lee, Benjamin Kaiser, Jonathan Mayer, Arvind Narayanan [SOUPS'20]
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication
Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel [Oakland'20]
Empirical Measurement of Systemic 2FA Usability
Joshua Reynolds, Nikita Samarin, Joseph Barnes, Taylor Judd, Joshua Mason, and Michael Bailey, Serge Egelman [USENIX Security'20]
“It's Stored, Hopefully, on an Encrypted Server”: Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn
Leona Lassak, Annika Hildebrandt, Maximilian Golla, Blase Ur [USENIX Security'21]
Week 9 Oct 31
Fallback Authentication
Nov 2
Attacks on FIDO2
“I’m Surprised So Much Is Connected”
Sven Hammann, Michael Crabb, Sasa Radomirovic, Ralf Sasse, David Basin [CHI'22]
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy
Michal Kepkowski, Lucjan Hanzlik, Ian Wood, Mohamed Ali Kaafar [PoPETS'22]
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google
Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson [WWW'15]
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
Alon Shakevsky, Eyal Ronen, Avishai Wool [USENIX Security'22]
Week 10 Nov 7
Risk-based Authentication
Nov 9
Shoulder Surfing
Evaluating Login Challenges as a Defense Against Account Takeover
Periwinkle Doerfler, Kurt Thomas, Maija Marincenko, Juri Ranieri, Yu Jiang, Angelika Moscicki, Damon McCoy [WWW'19]
Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research
Florian Mathis, Joseph O’Hagan, Mohamed Khamis, Kami Vaniea [VR'22]
What’s in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics
Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono [FC'21]
Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual Reality
Florian Mathis, Joseph O'Hagan, Kami Vaniea, Mohamed Khamis [AVI'22]
Week 11 Nov 14
Biometrics
Nov 16
Implicit/Continuous Authentication
EchoPrint: Two-factor Authentication Using Acoustics and Vision on Smartphones
Bing Zhou, Jay Lohokare, Ruipeng Gao, Fan Ye [MobiCom'18]
Common Evaluation Pitfalls in Touch-Based Authentication Systems
Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic [AsiaCCS'22]
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe [USENIX Security'21]
EarGate: Gait-based User Identification with In-ear Microphones
Andrea Ferlini, Dong Ma, Robert Harle, Cecilia Mascolo [MobiCom'21]
Week 12 Nov 21
Voice Authentication
Nov 23
De-Authentication
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen, Sen Chenb, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu [Oakland'21]
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection
Matteo Cardaioli, Mauro Conti, Pier Paolo Tricomi, Gene Tsudik [PerCom'22]
“Hello, It's Me”: Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao [CCS'21]
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
Prakash Shrestha, Nitesh Saxena [ACNS'22]
Week 13 Nov 28
Cryptographic Authentication Systems
Nov 30
Project Presentations
With a Little Help from My Friends: Constructing Practical Anonymous Credentials
Lucjan Hanzlik, Daniel Slamanig [CCS'21]
Let’s Authenticate: Automated Certificates for User Authentication
James Conners, Corey Devenport, Stephen Derbidge, Natalie Farnsworth, Kyler Gates, Stephen Lambert, Christopher McClain, Parker Nichols, Daniel Zappala [NDSS'22]
Week 14 Dec 5
Project Presentations
Final project report due Dec 16.