{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:57:42Z","timestamp":1772042262611,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["2021.07225.BD,2021.08587.BD"],"award-info":[{"award-number":["2021.07225.BD,2021.08587.BD"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3600174","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Rogue key and impersonation attacks on FIDO2: From theory to practice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6848-5564","authenticated-orcid":false,"given":"Manuel","family":"Barbosa","sequence":"first","affiliation":[{"name":"Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, rua do Campo Alegre s\/n, 4169-007 Porto, Portugal and INESC TEC, Porto, Portugal, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3433-9809","authenticated-orcid":false,"given":"Andr\u00e9","family":"Cirne","sequence":"additional","affiliation":[{"name":"Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, rua do Campo Alegre s\/n, 4169-007 Porto, Portugal and INESC TEC, Porto, Portugal, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6387-9271","authenticated-orcid":false,"given":"Lu\u00eds","family":"Esqu\u00edvel","sequence":"additional","affiliation":[{"name":"Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, rua do Campo Alegre s\/n, 4169-007 Porto, Portugal and INESC TEC, Porto, Portugal, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FIDO Alliance. 2022. Client to AAuthenticator Protocol (CTAP) \u2013 Proposed Standard. https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Manuel Barbosa Alexandra Boldyreva Shan Chen and Bogdan Warinschi. 2021. Provable Security Analysis of FIDO2. CRYPTO.","DOI":"10.1007\/978-3-030-84252-9_5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179454"},{"key":"e_1_3_2_1_5_1","unstructured":"Jaime Blasco. 2012. Sykipot variant hijacks DOD and Windows smart cards. https:\/\/www.alienvault.com\/open-threat-exchange\/blog\/sykipot-variant-hijacks-dod-and-windows-smart-cards."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"P.\u00a0Hoffman C.\u00a0Bormann. 2020. RFC 8949 Concise Binary Object Representation (CBOR). https:\/\/www.rfc-editor.org\/rfc\/rfc8949.html","DOI":"10.17487\/RFC8949"},{"key":"e_1_3_2_1_7_1","unstructured":"World Wide\u00a0Web Consortium 2019. Web Authentication: An API for accessing Public Key Credentials Level 1 \u2013 W3C Recommendation. https:\/\/www.w3.org\/TR\/webauthn."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-15773"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020"},{"key":"e_1_3_2_1_10_1","unstructured":"MITRE. 2021. T1111 - Multi-Factor Authentication Interception. https:\/\/attack.mitre.org\/techniques\/T1111\/."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600174","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3600174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":9,"alternative-id":["10.1145\/3600160.3600174","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3600174","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}