Your privacy, your choice

We use essential cookies to make sure the site can function. We also use optional cookies for advertising, personalisation of content, usage analysis, and social media.

By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with varying standards of data protection.

See our privacy policy for more information on the use of your personal data.

for further information and to change your choices.

Skip to main content

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2023)

Abstract

As the use of authenticator applications for two-factor authentication (2FA) has become increasingly common, there is a growing need to assess the security of these applications. In this paper, we present a security analysis of authenticator applications that are widely used on various platforms, such as Google Authenticator, Microsoft Authenticator, and Authy. Our analysis includes an examination of the security features of these applications (e.g., level of protection) as well as the communication protocols used between the applications and the servers. Our results show that these applications have significant vulnerabilities that could compromise the security of the authentication process. Specifically, we found that some authenticator applications store sensitive data, such as secret keys, in plain text, making them vulnerable to attacks. Overall, our findings indicate that there is a need for better security practices in the design and implementation of authenticator applications. We recommend that developers follow best practices for secure coding and use well-established cryptographic algorithms to generate one-time codes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
Â¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://support.google.com/accounts/answer/1066447.

  2. 2.

    https://www.microsoft.com/en-us/security/mobile-authenticator-app.

  3. 3.

    https://authy.com/.

  4. 4.

    https://www.postman.com/.

References

  1. Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644 (2009)

    Google Scholar 

  2. Buhov, D., Huber, M., Merzdovnik, G., Weippl, E.: Pin it! improving android network security at runtime. In: 2016 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 297–305 (2016)

    Google Scholar 

  3. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027–2051 (2016)

    Article  Google Scholar 

  4. Cortesi, A., Hils, M., Kriechbaumer, T., contributors: mitmproxy: a free and open source interactive HTTPS proxy (2010). https://mitmproxy.org/ [Version 9.0]

  5. Do, Q., Martini, B., Choo, K.R.: The role of the adversary model in applied security research. Comput. Secur. 81, 156–181 (2019)

    Article  Google Scholar 

  6. Evans, C., Palmer, C., Sleevi, R.: RFC 7469: Public key pinning extension for HTTP (2015)

    Google Scholar 

  7. Fahl, S., Harbach, M., Muders, T., Baumgärtner, L., Freisleben, B., Smith, M.: Why eve and mallory love Android: an analysis of Android SSL (in) security. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 50–61 (2012)

    Google Scholar 

  8. Fahl, S., Harbach, M., Perl, H., Koetter, M., Smith, M.: Rethinking SSL development in an appified world. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 49–60 (2013)

    Google Scholar 

  9. Gavazzi, A., Williams, R., Kirda, E., Lu, L., King, A., Davis, A., Leek, T.: A study of multi-factor and risk-based authentication availability. In: 32nd USENIX Security Symposium, USENIX Security, pp. 1–18 (2023)

    Google Scholar 

  10. Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The most dangerous code in the world: Validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 38–49 (2012)

    Google Scholar 

  11. Keerthi, V.K., et al.: Taxonomy of SSL/TLS attacks. Int. J. Comput. Netw. Inf. Secur. 8(2), 15 (2016)

    MathSciNet  Google Scholar 

  12. Marky, K., etal.: “nah, it’s just annoying!" a deep dive into user perceptions of two-factor authentication. ACM Trans. Comput. Hum. Interact. 29(5), 43:1–43:32 (2022)

    Google Scholar 

  13. Merzdovnik, G., Buhov, D., Voyiatzis, A.G., Weippl, E.R.: Notary-assisted certificate pinning for improved security of Android apps. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 365–371 (2016)

    Google Scholar 

  14. Modarres, A.M.A., Sarbishaei, G.: An improved lightweight two-factor authentication protocol for IoT applications. IEEE Trans. Industr. Inf. 19(5), 6588–6598 (2023)

    Article  Google Scholar 

  15. Narayanan, A., Lee, K.: Security policy audits: why and how. IEEE Secur. Priv. 21(2), 77–81 (2023)

    Article  Google Scholar 

  16. Onwuzurike, L., De Cristofaro, E.: Danger is my middle name: experimenting with SSL vulnerabilities in android apps. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 1–6 (2015)

    Google Scholar 

  17. Peeters, C., Patton, C., Munyaka, I.N.S., Olszewski, D., Shrimpton, T., Traynor, P.: SMS OTP security (SOS): hardening SMS-based two factor authentication. In: ASIA CCS: ACM Asia Conference on Computer and Communications Security, pp. 2–16 (2022)

    Google Scholar 

  18. Stricot-Tarboton, S., Chaisiri, S., Ko, R.K.: Taxonomy of man-in-the-middle attacks on HTTPS. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 527–534 (2016)

    Google Scholar 

  19. Zhou, Z., Han, X., Chen, Z., Nan, Y., Li, J., Gu, D.: Simulation: demystifying (insecure) cellular network based one-tap authentication services. In: 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 534–546 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kim-Kwang Raymond Choo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nash, A., Studiawan, H., Grispos, G., Choo, KK.R. (2024). Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-56583-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56583-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56582-3

  • Online ISBN: 978-3-031-56583-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics