
tion Schemes. In 2012 IEEE Symposium on Security
and Privacy, pages 553–567.
B
¨
uttner, A. and Gruschka, N. (2022). Protecting FIDO
Extensions Against Man-in-the-Middle Attacks. In
International Workshop on Emerging Technologies
for Authorization and Authentication, pages 70–87.
Springer.
Desai, C. (2024). More users can now save passkeys in
Google Password Manager. https://blog.google/
technology/safety-security/google-password-
manager-passkeys-update-september-2024/ (Last
accessed: 2024/12/13).
Dressel, T., List, E., and Echtler, F. (2019). SecuriCast:
zero-touch two-factor authentication using WebBlue-
tooth. In Proceedings of the ACM SIGCHI Symposium
on Engineering Interactive Computing Systems, pages
1–6.
FIDO Alliance (2024). FIDO Alliance Publishes
New Specifications to Promote User Choice and
Enhanced UX for Passkeys - FIDO Alliance.
https://fidoalliance.org/fido-alliance-publishes-
new-specifications-to-promote-user-choice-
and-enhanced-ux-for-passkeys/ (Last accessed:
2024/12/13).
Frymann, N., Gardham, D., Kiefer, F., Lundberg, E., Man-
ulis, M., and Nilsson, D. (2020). Asynchronous Re-
mote Key Generation: An Analysis of Yubico’s Pro-
posal for W3C WebAuthn. In Proceedings of the 2020
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 939–954.
Guan, J., Li, H., Ye, H., and Zhao, Z. (2022). A formal
analysis of the FIDO2 protocols. In European Sympo-
sium on Research in Computer Security, pages 3–21.
Springer.
Iozzo, V. and Mroz, K. (2023). Passkeys - Threat
modeling and implementation considerations.
https://www.slashid.dev/blog/passkeys-security-
implementation/ (Last accessed: 2024/07/18).
Kepkowski, M., Machulak, M., Wood, I., and Kaafar, D.
(2023). Challenges with passwordless FIDO2 in an
enterprise setting: A usability study. In 2023 IEEE
Secure Development Conference (SecDev), pages 37–
48. IEEE.
Kim, D., Kim, S., Ryu, G., and Choi, D. (2024). Ses-
sion Replication Attack Through QR Code Sniffing
in Passkey CTAP Registration. In IFIP International
Conference on ICT Systems Security and Privacy Pro-
tection, pages 294–307. Springer.
Kuchhal, D., Saad, M., Oest, A., and Li, F. (2023). Evalu-
ating the Security Posture of Real-World FIDO2 De-
ployments. In Proceedings of the 2023 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 2381–2395.
Kumar, A., Jones, J., Hodges, J., Jones, M., and Lundberg,
E. (2021). Web Authentication: An API for accessing
Public Key Credentials - Level 2.
Kunke, J., Wiefling, S., Ullmann, M., and Lo Iacono,
L. (2021). Evaluation of Account Recovery Strate-
gies with FIDO2-based Passwordless Authentica-
tion. In Open Identity Summit 2021, pages 59–70.
Gesellschaft f
¨
ur Informatik e.V., Bonn.
Lassak, L., Pan, E., Ur, B., and Golla, M. (2024). Why
Aren’t We Using Passkeys? Obstacles Companies
Face Deploying FIDO2 Passwordless Authentica-
tion. In 33rd USENIX Security Symposium (USENIX
Security 24), pages 7231–7248, Philadelphia, PA.
USENIX Association.
Lyastani, S. G., Schilling, M., Neumayr, M., Backes, M.,
and Bugiel, S. (2020). Is FIDO2 the Kingslayer of
User Authentication? A Comparative Usability Study
of FIDO2 Passwordless Authentication. In 2020 IEEE
Symposium on Security and Privacy (SP), pages 268–
285.
Mahdad, A. T., Jubur, M., and Saxena, N. (2024). Breach-
ing security keys without root: Fido2 deception at-
tacks via overlays exploiting limited display authen-
ticators. In Proceedings of the 2024 on ACM SIGSAC
Conference on Computer and Communications Secu-
rity, CCS ’24, page 1686–1700, New York, NY, USA.
Association for Computing Machinery.
Owens, K., Anise, O., Krauss, A., and Ur, B. (2021). User
Perceptions of the Usability and Security of Smart-
phones as FIDO2 Roaming Authenticators. In Sev-
enteenth Symposium on Usable Privacy and Security
(SOUPS 2021), pages 57–76. USENIX Association.
Pearman, S., Zhang, S. A., Bauer, L., Christin, N., and Cra-
nor, L. F. (2019). Why people (don’t) use password
managers effectively. In Fifteenth Symposium on Us-
able Privacy and Security (SOUPS 2019), pages 319–
338, Santa Clara, CA. USENIX Association.
Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron,
J., and Seamons, K. (2019). A Usability Study of
Five Two-Factor Authentication Methods. In Fifteenth
Symposium on Usable Privacy and Security (SOUPS
2019), pages 357–370.
Reynolds, J., Samarin, N., Barnes, J., Judd, T., Mason,
J., Bailey, M., and Egelman, S. (2020). Empirical
Measurement of Systemic 2FA Usability. In 29th
USENIX Security Symposium (USENIX Security 20),
pages 127–143.
Saxe, D. (2023). Authenticate 2023 The New Passkey
Threat Model. https://www.youtube.com/watch?v=
1TRViLIxAMU (Last accessed: 2024/07/18).
Toubba, K. (2022). 12-22-2022: Notice of Security
Incident. https://blog.lastpass.com/posts/notice-of-
recent-security-incident (Last accessed: 2024/12/16).
W
¨
ursching, L., Putz, F., Haesler, S., and Hollick, M. (2023).
FIDO2 the rescue? Platform vs. roaming authentica-
tion on smartphones. In Proceedings of the 2023 CHI
Conference on Human Factors in Computing Systems,
pages 1–16.
Xu, P., Sun, R., Wang, W., Chen, T., Zheng, Y., and Jin, H.
(2021). SDD: A trusted display of FIDO2 transaction
confirmation without trusted execution environment.
Future Generation Computer Systems, 125:32–40.
Yadav, T. K. and Seamons, K. (2023). A Security and
Usability Analysis of Local Attacks Against FIDO2.
arXiv preprint arXiv:2308.02973.
Device-Bound vs. Synced Credentials: A Comparative Evaluation of Passkey Authentication
659