A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
All your face are belong to us
2012
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12
Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal analysis of social authentication weaknesses against attackers inside the victim's social circles. In this paper, we extend the
doi:10.1145/2420950.2421008
dblp:conf/acsac/PolakisLKMIKZ12
fatcat:w46xurhvcjgz3en4xkns3mqcxq