References
- B. Ives, K.R. Walsh and H. Schneider, "The Domino Effect of Password Reuse," Comm. of the ACM, vol. 47, no. 4, pp. 75-78, April 2004. https://doi.org/10.1145/975817.975820
- C. Wang, S.T.K. Jan, H. Hu, D. Bossart, and G. Wang, "The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services," Proc. of ACM Conf. in Data and Application Security and Privacy, pp. 196-203, Tempe, USA, Mar. 2018.
- S. Gunaratna, "Why reusing your passwords is riskier than ever," https://www.cbsnews.com/news/reusing-passwords-is-riskier-than-ever-botnet-cyber-attacks-security/, May 2016. (accessed Jan. 30, 2020).
- S. Oesch and S. Ruoti, "That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers," Proc. of USENIX Security Symp., 2020(to appear).
- D. Silver, S. Jana, D. Boneh, E. Chen, and C. Jackson, "Password managers: Attacks and defenses," Proc. of USENIX Security Symp., pp. 449-464, San Diego, USA, Aug. 2014.
- S. G. Lyastani, M. Schilling, S. Fahl, M. Backes, and S. Bugiel, "Better managed than memorized? Studying the impact of managers on password strength and reuse," Proc. of USENIX Security Symp., pp.203-220, Baltimore, USA, Aug. 2018.
- M. Horsch, A. Hulsing, and J. Buchmann, "PALPAS PAsswordLess PAssword Synchronization," Proc. on Int'l Conf. on Availability, Reliability and Security, France, August 2015.
- F.A. Maqbali and C.J. Mitchell, "AutoPass: An Automatic Password Generator," Proc. of Int'l Carnahan Conf. on SecurityTechnology, Spain, Oct. 2017.
- Y.T. Liu, Y.B. Xia, H.B. Chen, B.Y. Zang, and Z. Liang, "SplitPass: A Mutually Distrusting Two-Party Password Manager," Jr. of Computer Science and Technology, vol. 30, no. 1, pp. 98-115, Jan. 2018.
- B. Lee, "Multi-factor secure password manager using a secret sharing scheme," Australian National University Technical Report, May 2019.
- K.C. Wang and M.K. Reiter, "How to End Password Reuse on the Web," Proc. of Network and Distributed System Security Symp., San Diego, USA, Feb. 2019.
- M. Shirvanian, S. Jarecki, H. Krawczyk, and N. Saxena, "SPHINX: A Password Store that Perfectly Hides Passwords from Itself," Proc. of IEEE Int'l Conf. on Distributed Computing Systems, pp. 1094-1104, 2017.
- Z.W. Li, W. He, D. Akhawe, and D. Song, "The emperor's new password manager: Security analysis of web-based password managers," Proc. of USENIX Security Symp., pp. 465-479, San Diego, USA, Aug. 2014.
- X. de C. de Carnavalet and M. Mannan, "From very weak to very strong: Analyzing password-strength meters," Proc. of Network and Distributed System Security Symp., San Diego, USA, Feb. 2014.
- D.L. Wheeler, "zxcvbn: Low-budget password strength estimation," Proc. USENIX Security Symp., pp. 157-174, Austin, USA, Aug. 2016.
- R. Grimes, "The many ways to hack 2FA," Network Security, vol. 2019, issue 9, pp. 8-13, Sept. 2019. https://doi.org/10.1016/s1353-4858(19)30107-2
- Mazar Bot Android Malware Distributed via SMS Spoofing Campaign(2016), https://www.tripwire.com/state-of-security/featured/mazarbotandroid-malware-distributed-via-sms-spoofing-campaign/ (accessed Jan. 31, 2020).
- BankBot-Mazain(2017), https://github.com/bem re/bankbot-mazain (accessed Jan. 31, 2020).
- How to Read Someone's Text Messages Without Having Their Phone?(2020), https://nexspy.com/read-someones-text-messages/ (accessed Jan. 31, 2020).
- H. Siadati, T. Nguyen, P. Gupta, M. Jakobsson, and N. Memon, "Mind your SMSes: Mitigating social engineering in second-factor authentication," Computers & Security, vol. 65, pp. 14-28, Mar. 2017. https://doi.org/10.1016/j.cose.2016.09.009
- 차병래, 최명수, 박선, 김종원, "보안 강화를 위한 NFC 기반 전자결제 시스템의 2 팩터 인증 기술의 초안 설계," 스마트미디어저널, 제5권, 제2호, 77-83쪽, 2016년 6월
- 이현영, 강승식, "워드 임베딩과 딥러닝 기법을 이용한 SMS 문자 메시지 필터링," 스마트미디어저널, 제7권, 제4호, 24-29쪽, 2018년 12월 https://doi.org/10.30693/smj.2018.7.4.24
- Hackers Hit Twitter CEO Jack Dorsey in a 'SIM Swap.' You're at Risk, Too(2019), https://nytimes.com/2019/09/05/technology/sim-swap-jack-dorsey-hack.html (accessed Jan. 31, 2020).
- 조우진, 김형식, "행위 유사도 기반 변종 악성코드 탐지 방법," 스마트미디어저널, 제8권 제4호, 25-32 쪽, 2019년 12월 https://doi.org/10.30693/SMJ.2019.8.4.25
- Busting SIM Swappers and SIM Swap Myths(2018), https://krebsonsecurity.com/2018/11/busting-sim-swappers-and-sim-swap-myths/ (accessed Jan 30, 2020).