Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication
Title | Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Sasa, K., Kikuchi, H. |
Conference Name | 2018 IEEE Conference on Dependable and Secure Computing (DSC) |
Publisher | IEEE |
ISBN Number | 978-1-5386-5790-4 |
Keywords | authentication, Human Behavior, human factors, LinkedIn, password, PRMitM, pubcrawl, Registers, Two factor Authentication, two-factor authentication, Uniform resource locators |
Abstract | In 2017, Gelernter et al. identified the ``password-reset man-in-the-middle'' attack, which can take over a user's account during two-factor authentication. In this attack, a password reset request is sent via an SMS message instead of an expected authentication request, and the user enters a reset code at the malicious man-in-the-middle website without recognizing that the code resets the password. Following this publication, most vulnerable websites attempted to remove the vulnerability. However, it is still not clear whether these attempts were sufficient to prevent careless users from being attacked. In this paper, we describe the results of an investigation involving domestic major websites that were vulnerable to this type of attack. To clarify the causes of vulnerability, we conducted experiments with 180 subjects. The SMS-message parameters were ``with/without warning'', ``numeric/alphanumeric code'', and ``one/two messages'', and subjects were tested to see if they input the reset code into the fake website. According to the result of the experiment, we found that the PRMitM risk odds were increased 4.6, 1.86, and 11.59 times higher in a no-warning case, a numeric-only reset code, and a behavior that change passwords very frequently, respectively. |
URL | https://ieeexplore.ieee.org/document/8625132 |
DOI | 10.1109/DESEC.2018.8625132 |
Citation Key | sasa_impact_2018 |