TY - GEN
T1 - Tactics for Account Access Graphs
AU - Arnaboldi, Luca
AU - Aspinall, David
AU - Kolb, Christina
AU - Radomirović, Saša
N1 - Publisher Copyright:
© 2024, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2024/1/12
Y1 - 2024/1/12
N2 - Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both multiple simultaneous access routes (e.g., for multi-factor authentication) as well as multiple alternative access routes (e.g., for account recovery). In this paper we extend the formalism with state transitions and tactics. State transitions capture how access may change over time as users or adversaries use access routes and add or remove credentials and accounts. Tactics allow us to model and document attacker techniques or resilience strategies, by writing small programs. We illustrate these ideas using some attacks against mobile authentication and banking applications which have been publicised in 2023.
AB - Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both multiple simultaneous access routes (e.g., for multi-factor authentication) as well as multiple alternative access routes (e.g., for account recovery). In this paper we extend the formalism with state transitions and tactics. State transitions capture how access may change over time as users or adversaries use access routes and add or remove credentials and accounts. Tactics allow us to model and document attacker techniques or resilience strategies, by writing small programs. We illustrate these ideas using some attacks against mobile authentication and banking applications which have been publicised in 2023.
KW - account access graphs
KW - Android
KW - iOS
KW - security
KW - tactics
UR - https://www.scopus.com/pages/publications/85184089041
U2 - 10.1007/978-3-031-51479-1_23
DO - 10.1007/978-3-031-51479-1_23
M3 - Conference contribution
AN - SCOPUS:85184089041
SN - 9783031514784
T3 - Lecture Notes in Computer Science
SP - 452
EP - 470
BT - Computer Security – ESORICS 2023
A2 - Tsudik, Gene
A2 - Conti, Mauro
A2 - Liang, Kaitai
A2 - Smaragdakis, Georgios
PB - Springer
T2 - 28th European Symposium on Research in Computer Security 2023
Y2 - 25 September 2023 through 29 September 2023
ER -