Tactics for Account Access Graphs

Luca Arnaboldi*, David Aspinall, Christina Kolb, Saša Radomirović

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both multiple simultaneous access routes (e.g., for multi-factor authentication) as well as multiple alternative access routes (e.g., for account recovery). In this paper we extend the formalism with state transitions and tactics. State transitions capture how access may change over time as users or adversaries use access routes and add or remove credentials and accounts. Tactics allow us to model and document attacker techniques or resilience strategies, by writing small programs. We illustrate these ideas using some attacks against mobile authentication and banking applications which have been publicised in 2023.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2023
EditorsGene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis
PublisherSpringer
Pages452-470
Number of pages19
ISBN (Electronic)9783031514791
ISBN (Print)9783031514784
DOIs
Publication statusPublished - 12 Jan 2024
Event28th European Symposium on Research in Computer Security 2023 - The Hague, Netherlands
Duration: 25 Sept 202329 Sept 2023

Publication series

NameLecture Notes in Computer Science
Volume14346
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th European Symposium on Research in Computer Security 2023
Abbreviated titleESORICS 2023
Country/TerritoryNetherlands
CityThe Hague
Period25/09/2329/09/23

Keywords

  • account access graphs
  • Android
  • iOS
  • security
  • tactics

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Tactics for Account Access Graphs'. Together they form a unique fingerprint.

Cite this