There is a newer version of the record available.

Published January 30, 2025 | Version v1
Conference proceeding Open

Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments

Contributors

  • 1. Cornell Tech

Description

These are the UI stepthrough protocols accompanying our paper: "Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments". 

We compile all stepthroughs in multiple Excel sheets corresponding to the "abuse vectors" mentioned in our paper. Each Excel sheet contains a Readme file clarifying the client-side configurations and a high-level description of what the tasks assigned to the analyst were in order to realize an abuse vector and carry out an attack. For the gaslighting abuse vector, please refer to our paper where we include a summary of all account security interfaces (ASIs) across all the services studied and their spoofability (Figure 4). Each row in the sheet corresponds to a service and all interfaces shown are that of the service. We only include services for which an abuse vector applies. For example, the adversarial passkeys abuse vector requires that a service supports multiple passkeys per user account, thus we exclude all services for which only a single passkey per account is supported. 

Files

Files (170.1 MB)

Name Size Download all
md5:601a758d66830edc6c48782270ecd659
11.4 MB Download
md5:86c1bdac46bafdb1c78f3116298af022
51.1 MB Download
md5:3c148d0abaea42a944a84e037964fff8
43.9 MB Download
md5:607725ef481e6112aa44e5b174a39ead
63.7 MB Download