Tactics for Account Access Graphs

Luca Arnaboldi, David Aspinall, Christina Kolb, Sasa Randomirovic

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both multiple simultaneous access routes (e.g., for multi-factor authentication) as well as multiple alternative access routes (e.g., for account recovery). In this paper we extend the formalism with state transitions and tactics. State transitions capture how access may change over time as users or adversaries use access routes and add or remove credentials and accounts. Tactics allow us to model and document attacker techniques or resilience strategies, by writing small programs. We illustrate these ideas using some attacks against mobile authentication and banking applications which have been publicised in 2023.
Original languageEnglish
Title of host publicationComputer Security – ESORICS 2023
Subtitle of host publication28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III
EditorsGene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis
Pages452-470
Number of pages19
ISBN (Electronic)978-3-031-51479-1
DOIs
Publication statusPublished - 2024
Externally publishedYes
Event28th European Symposium on Research in Computer Security, ESORICS 2023 - The Hague, Netherlands
Duration: 25 Sept 202329 Sept 2023
Conference number: 28

Conference

Conference28th European Symposium on Research in Computer Security, ESORICS 2023
Abbreviated titleESORICS 2023
Country/TerritoryNetherlands
CityThe Hague
Period25/09/2329/09/23

Keywords

  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Tactics for Account Access Graphs'. Together they form a unique fingerprint.

Cite this