
ery Deployments. In Proceedings of the 2023 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 3138–3152.
Beatriz Henr
´
ıquez (2022). Mobile Theft and Loss Report -
2020/2021 Edition. https://preyproject.com/blog/mob
ile-theft-and-loss-report-2020-2021-edition.
Bitkom (2021). Gestohlen oder verloren: Vier von zehn
Personen ist schon mal das Handy abhandengekom-
men. https://www.bitkom.org/Presse/Presseinformat
ion/Gestohlen-oder-verloren-Vier-von-zehn-Persone
n-ist-schon-mal-das-Handy-abhandengekommen.
Brand, Christiaan, K. S. (2023). The beginning of the end of
the password. https://blog.google/technology/safety-s
ecurity/the-beginning-of-the-end-of-the-password/.
Das, S., Wang, B., and Camp, L. J. (2019). MFA is a Waste
of Time! Understanding Negative Connotation To-
wards MFA Applications via User Generated Content.
arXiv preprint arXiv:1908.05902.
Davis, D. K., Chowdhury, M. M., and Rifat, N. (2022).
Password Security: What Are We Doing Wrong? In
2022 IEEE International Conference on Electro Infor-
mation Technology (eIT), pages 562–567. IEEE.
European Commission (2023). eIDAS Levels of Assurance.
https://ec.europa.eu/digital-building-blocks/wikis/di
splay/DIGITAL/eIDAS+Levels+of+Assurance.
Gavazzi, A., Williams, R., Kirda, E., Lu, L., King, A.,
Davis, A., and Leek, T. (2023). A Study of Multi-
Factor and Risk-Based Authentication Availability. In
32nd USENIX Security Symposium (USENIX Secu-
rity’23). USENIX Association, Anaheim, CA, USA.
Gerlitz, E., H
¨
aring, M., M
¨
adler, C. T., Smith, M., and Tiefe-
nau, C. (2023). Adventures in recovery land: Test-
ing the account recovery of popular websites when the
second factor is lost. In Nineteenth Symposium on Us-
able Privacy and Security (SOUPS 2023), pages 227–
243.
Google (2022). Passwordless login with passkeys. https:
//developers.google.com/identity/passkeys.
Grassi, P., Fenton, J., Newton, E., Perlner, R., Regenscheid,
A., Burr, W., Richer, J., Lefkovitz, N., Danker, J.,
Choong, Y.-Y., Greene, K., and Theofanos, M. (2020).
Digital Identity Guidelines: Authentication and Life-
cycle Management.
Hammann, S., Crabb, M., Radomirovic, S., Sasse, R., and
Basin, D. (2022). I’m Surprised So Much Is Con-
nected. In CHI Conference on Human Factors in
Computing Systems, pages 1–13.
Hammann, S., Radomirovi
´
c, S., Sasse, R., and Basin, D.
(2019). User account access graphs. In Proceedings
of the 2019 ACM SIGSAC Conference on Computer
and Communications Security, pages 1405–1422.
Hayashi, E. and Hong, J. (2011). A diary study of password
usage in daily life. In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems,
pages 2627–2630.
Jacomme, C. and Kremer, S. (2021). An extensive for-
mal analysis of multi-factor authentication protocols.
ACM Transactions on Privacy and Security (TOPS),
24(2):1–34.
Li, Y., Wang, H., and Sun, K. (2018). Email as a master key:
Analyzing account recovery in the wild. In IEEE IN-
FOCOM 2018-IEEE Conference on Computer Com-
munications, pages 1646–1654. IEEE.
Milka, G. (2018). Anatomy of Account Takeover. In
Enigma 2018 (Enigma 2018), Santa Clara, CA.
USENIX Association.
Ometov, A., Bezzateev, S., M
¨
akitalo, N., Andreev, S.,
Mikkonen, T., and Koucheryavy, Y. (2018). Multi-
factor authentication: A survey. Cryptography, 2(1):1.
Petsas, T., Tsirantonakis, G., Athanasopoulos, E., and Ioan-
nidis, S. (2015). Two-factor authentication: is the
world ready? Quantifying 2FA adoption. In Proceed-
ings of the eighth european workshop on system secu-
rity, pages 1–7.
P
¨
ohn, D., Gruschka, N., and Ziegler, L. (2022). Multi-
Account Dashboard for Authentication Dependency
Analysis. In Proceedings of the 17th International
Conference on Availability, Reliability and Security,
pages 1–13.
Prolific (2023). Prolific · Quickly find research participants
you can trust. https://www.prolific.com.
Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron,
J., and Seamons, K. (2019). A usability study of five
two-factor authentication methods. In Proceedings of
the Fifteenth Symposium on Usable Privacy and Secu-
rity.
Reynolds, J., Samarin, N., Barnes, J., Judd, T., Mason, J.,
Bailey, M., and Egelman, S. (2020). Empirical mea-
surement of systemic 2fa usability. In Proceedings of
the USENIX Conference.
Risher, M. (2021). A simpler and safer future — without
passwords. https://blog.google/technology/safety-sec
urity/a-simpler-and-safer-future-without-passwords/.
Shen, C., Yu, T., Xu, H., Yang, G., and Guan, X. (2016).
User practice in password security: An empirical
study of real-life passwords in the wild. Computers
& Security, 61:130–141.
Taneski, V., Heri
ˇ
cko, M., and Brumen, B. (2019). System-
atic overview of password security problems. Acta
Polytechnica Hungarica, 16(3):143–165.
Wiefling, S., Lo Iacono, L., and D
¨
urmuth, M. (2019). Is
this really you? An empirical study on risk-based au-
thentication applied in the wild. In ICT Systems Se-
curity and Privacy Protection: 34th IFIP TC 11 In-
ternational Conference, SEC 2019, Lisbon, Portugal,
June 25-27, 2019, Proceedings 34, pages 134–148.
Springer.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
700