Skip to main content

Showing 1–3 of 3 results for author: Huaman, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  2. arXiv:2211.06213  [pdf, other

    cs.CR

    Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories

    Authors: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl

    Abstract: Version control systems for source code, such as Git, are key tools in modern software development environments. Many developers use online services, such as GitHub or GitLab, for collaborative software development. While software projects often require code secrets to work, such as API keys or passwords, they need to be handled securely within the project. Previous research and news articles have… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  3. arXiv:1801.02742  [pdf, other

    cs.CR

    A Large Scale Investigation of Obfuscation Use in Google Play

    Authors: Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl

    Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to s… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 January, 2018; originally announced January 2018.