{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:52:34Z","timestamp":1773294754899,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["04524\/2020,50008\/2020"],"award-info":[{"award-number":["04524\/2020,50008\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664496","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6207-6292","authenticated-orcid":false,"given":"Patricio","family":"Domingues","sequence":"first","affiliation":[{"name":"School of Technology and Management, Polytechnic Institute of Leiria, Portugal and Instituto de Telecomunica\u00e7\u00f5es, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4405-7696","authenticated-orcid":false,"given":"Miguel","family":"Frade","sequence":"additional","affiliation":[{"name":"School of Technology and Management, Polytechnic Institute of Leiria, Portugal and Computer Science and Communication Research Centre, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6540-3164","authenticated-orcid":false,"given":"Miguel","family":"Negrao","sequence":"additional","affiliation":[{"name":"School of Technology and Management, Polytechnic Institute of Leiria, Portugal and Computer Science and Communication Research Centre, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Web Authentication: An API for accessing Public Key Credentials - Level 2. https:\/\/www.w3.org\/TR\/webauthn-2 [Online","year":"2023","unstructured":"2021. Web Authentication: An API for accessing Public Key Credentials - Level 2. https:\/\/www.w3.org\/TR\/webauthn-2 [Online; accessed 26. Dec. 2023]."},{"key":"e_1_3_2_1_2_1","volume-title":"CyberChef - The Cyber Swiss Army Knife. https:\/\/cyberchef.io [Online","year":"2024","unstructured":"2022. CyberChef - The Cyber Swiss Army Knife. https:\/\/cyberchef.io [Online; accessed 01. Feb. 2024]."},{"key":"e_1_3_2_1_3_1","volume-title":"FIDO2 API for Android. https:\/\/developers.google.com\/identity\/fido\/android\/native-apps [Online","year":"2024","unstructured":"2022. FIDO2 API for Android. https:\/\/developers.google.com\/identity\/fido\/android\/native-apps [Online; accessed 8. Jan. 2024]."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/aaguid.nicolasuter.ch [Online","year":"2024","unstructured":"2024. AAGUIDs. https:\/\/aaguid.nicolasuter.ch [Online; accessed 02. Feb. 2024]."},{"key":"e_1_3_2_1_5_1","volume-title":"Clean Your System and Free Disk Space | BleachBit. https:\/\/www.bleachbit.org [Online","year":"2024","unstructured":"2024. Clean Your System and Free Disk Space | BleachBit. https:\/\/www.bleachbit.org [Online; accessed 22. Feb. 2024]."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/fidoalliance.org [Online","author":"Alliance FIDO","year":"2024","unstructured":"2024. FIDO Alliance. https:\/\/fidoalliance.org [Online; accessed 8. Jan. 2024]."},{"key":"e_1_3_2_1_7_1","volume-title":"Passkeys in 1Password: The Future of Passwordless Authentication.https:\/\/1password.com\/product\/passkeys [Online","year":"2024","unstructured":"1Password. 2024. Passkeys in 1Password: The Future of Passwordless Authentication.https:\/\/1password.com\/product\/passkeys [Online; accessed 27. Feb. 2024]."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/passkeys.directory [Online","year":"2024","unstructured":"1Password. 2024. Passkeys.directory. https:\/\/passkeys.directory [Online; accessed 21. Feb. 2024]."},{"key":"e_1_3_2_1_9_1","unstructured":"Heather Adkins. 2024. Passkeys Cross-Account Protection and new ways we\u2019re protecting your accounts. https:\/\/blog.google\/technology\/safety-security\/google-passkeys-update-april-2024"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600174"},{"key":"e_1_3_2_1_11_1","volume-title":"Security of Passkeys in the Google Password Manager. https:\/\/security.googleblog.com\/2022\/10\/SecurityofPasskeysintheGooglePasswordManager.html [Online","author":"Birgisson Arnar","year":"2024","unstructured":"Arnar Birgisson. 2022. Security of Passkeys in the Google Password Manager. https:\/\/security.googleblog.com\/2022\/10\/SecurityofPasskeysintheGooglePasswordManager.html [Online; accessed 11. Jan. 2024]."},{"key":"e_1_3_2_1_12_1","volume-title":"Innovating in passwordless. https:\/\/bitwarden.com\/passwordless-passkeys\/ [Online","year":"2024","unstructured":"Bitwarden. 2024. Innovating in passwordless. https:\/\/bitwarden.com\/passwordless-passkeys\/ [Online; accessed 27. Feb. 2024]."},{"key":"e_1_3_2_1_13_1","volume-title":"I Stopped Using Passwords. It\u2019s Great and a Total Mess. WIRED (Feb","author":"Burgess Matt","year":"2024","unstructured":"Matt Burgess. 2024. I Stopped Using Passwords. It\u2019s Great and a Total Mess. WIRED (Feb. 2024). https:\/\/www.wired.com\/story\/stopped-using-passwords-passkeys"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Harlan Carvey. 2016. (second edition ed.). Syngress Boston. 1\u201335 pages. https:\/\/doi.org\/10.1016\/B978-0-12-803291-6.00001-2","DOI":"10.1016\/B978-0-12-803291-6.00001-2"},{"key":"e_1_3_2_1_15_1","volume-title":"Bringing passkeys to Android & Chrome. https:\/\/android-developers.googleblog.com\/2022\/10\/bringing-passkeys-to-android-and-chrome.html [Online","author":"Ken\u00a0Buchanan Diego\u00a0Zavala Ali Naddaf","year":"2024","unstructured":"Ali Naddaf Ken\u00a0Buchanan Diego\u00a0Zavala, Christiaan\u00a0Brand. 2022. Bringing passkeys to Android & Chrome. https:\/\/android-developers.googleblog.com\/2022\/10\/bringing-passkeys-to-android-and-chrome.html [Online; accessed 12. Jan. 2024]."},{"key":"e_1_3_2_1_16_1","volume-title":"Take control of your Apple ID","author":"Fleishman Glenn","unstructured":"Glenn Fleishman. 2023. Take control of your Apple ID, 4th edition. Alt Concepts.","edition":"4"},{"key":"e_1_3_2_1_17_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Gilsenan Conor","year":"2023","unstructured":"Conor Gilsenan, Fuzail Shakir, Noura Alomar, and Serge Egelman. 2023. Security and Privacy Failures in Popular 2FA Apps. In 32nd USENIX Security Symposium (USENIX Security 23)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_1"},{"key":"e_1_3_2_1_19_1","volume-title":"Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager. https:\/\/security.googleblog.com\/2024\/01\/upgrade-to-passkeys-on-pixel-with-google-password-manager.html [Online","author":"Hanna Sherif","year":"2024","unstructured":"Sherif Hanna. 2024. Effortlessly upgrade to Passkeys on Pixel phones with Google Password Manager. https:\/\/security.googleblog.com\/2024\/01\/upgrade-to-passkeys-on-pixel-with-google-password-manager.html [Online; accessed 21. Feb. 2024]."},{"key":"e_1_3_2_1_20_1","volume-title":"sysmon-modular. https:\/\/github.com\/olafhartong\/sysmon-modular\/blob\/master\/sysmonconfig-excludes-only.xml [Online","author":"Hartong Olaf","year":"2024","unstructured":"Olaf Hartong. 2023. sysmon-modular. https:\/\/github.com\/olafhartong\/sysmon-modular\/blob\/master\/sysmonconfig-excludes-only.xml [Online; accessed 01. Feb. 2024]."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33448-1_34"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623063"},{"key":"e_1_3_2_1_24_1","volume-title":"Passwordless Authentication USENIX. In 33rd USENIX Security Symposium (USENIX Security 24)","author":"Lassak Leona","year":"2024","unstructured":"Leona Lassak, Elleen Pan, Blase Ur, and Maximilian Golla. 2024. Why Aren\u2019t We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication USENIX. In 33rd USENIX Security Symposium (USENIX Security 24). Philadelphia, PA: USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/lassak"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503514"},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/system.security.securestring?view=net-8.0 [Online","author":"System SecureString","year":"2024","unstructured":"Microsoft. 2024. SecureString Class (System.Security). https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/system.security.securestring?view=net-8.0 [Online; accessed 13. May 2024]."},{"key":"e_1_3_2_1_27_1","volume-title":"Process Monitor - Sysinternals. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/procmon [Online","author":"Mark\u00a0Russinovitch","year":"2024","unstructured":"Mark\u00a0Russinovitch (Microsoft). 2023. Process Monitor - Sysinternals. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/procmon [Online; accessed 01. Feb. 2024]."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon [Online","author":"Sysinternals Mark\u00a0Russinovitch","year":"2024","unstructured":"Mark\u00a0Russinovitch (Microsoft). 2024. Sysmon - Sysinternals. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon [Online; accessed 01. Feb. 2024]."},{"key":"e_1_3_2_1_29_1","volume-title":"Support for passkeys in Windows - Windows Security. https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/passkeys\/ [Online","author":"Paolo\u00a0Matarazzo Aditi\u00a0Srivastava","year":"2024","unstructured":"Aditi\u00a0Srivastava Paolo\u00a0Matarazzo. 2023. Support for passkeys in Windows - Windows Security. https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/passkeys\/ [Online; accessed 8. Jan. 2024]."},{"key":"e_1_3_2_1_30_1","volume-title":"passkey-authenticator-aaguids. https:\/\/github.com\/passkeydeveloper\/passkey-authenticator-aaguids\/blob\/main\/aaguid.json [Online","year":"2024","unstructured":"passkeydeveloper. 2023. passkey-authenticator-aaguids. https:\/\/github.com\/passkeydeveloper\/passkey-authenticator-aaguids\/blob\/main\/aaguid.json [Online; accessed 02. Feb. 2024]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"RR Safin AS Abdiraman AM Nurusheva and LS Aldasheva. 2022. Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication. (2022).","DOI":"10.32523\/2616-7263-2022-140-3-114-124"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/00450618.2018.1551421"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469209"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24327"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:21Z","timestamp":1755881541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":34,"alternative-id":["10.1145\/3664476.3664496","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664496","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}