FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones

02/15/2023
by   Leon Würsching, et al.
0

Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.

READ FULL TEXT

page 1

page 2

page 4

page 7

research
07/01/2019

Geographical Security Questions for Fallback Authentication

Fallback authentication is the backup authentication method used when th...
research
10/12/2017

An empirical study of touch-based authentication methods on smartwatches

The emergence of smartwatches poses new challenges to information securi...
research
12/06/2021

Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases

Text-based secrets are still the most commonly used authentication mecha...
research
07/11/2019

Challenges and Directions for Authentication in Pervasive Computing

We quickly approach a "pervasive future" where pervasive computing is th...
research
08/24/2020

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

Personal Identification Numbers (PINs) are widely used as an access cont...
research
07/29/2019

Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come

User authentication can rely on various factors (e.g., a password, a cry...
research
12/16/2020

A novel Two-Factor HoneyToken Authentication Mechanism

The majority of systems rely on user authentication on passwords, but pa...

Please sign up or login with your details

Forgot password? Click here to reset