PUBLICATION: Exploitation and mitigation of authentication schemes based on device-public information
© ACM, 2017. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACSAC 2017, 33rd Annual Computer Security Applications Conference, December 4-8, 2017, Orlando, FL, USA http://dx.doi.org/10.1145/3134600.3134615