Skip to main content

Showing 1–3 of 3 results for author: Amft, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  2. arXiv:2203.11387  [pdf, other

    cs.HC

    Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites

    Authors: Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub

    Abstract: Modern websites frequently use and embed third-party services to facilitate web development, connect to social media, or for monetization. This often introduces privacy issues as the inclusion of third-party services on a website can allow the third party to collect personal data about the website's visitors. While the prevalence and mechanisms of third-party web tracking have been widely studied,… ▽ More

    Submitted 4 October, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 25 pages, 8 figures, 7 tables

  3. arXiv:1910.07269  [pdf, other

    cs.CR cs.HC

    "Get a Free Item Pack with Every Activation!" -- Do Incentives Increase the Adoption Rates of Two-Factor Authentication?

    Authors: Karoline Busse, Sabrina Amft, Daniel Hecker, Emanuel von Zezschwitz

    Abstract: Account security is an ongoing issue in practice. Two-Factor Authentication (2FA) is a mechanism which could help mitigate this problem, however adoption is not very high in most domains. Online gaming has adopted an interesting approach to drive adoption: Games offer small rewards such as visual modifications to the player's avatar's appearance, if players utilize 2FA. In this paper, we evaluate… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Comments: Accepted in Journal of Interactive Media (i-com), Special Issue on Usable Security and Privacy