Detecting Compromise of Passkey Storage on the Cloud
FIDO synced passkeys address account recovery challenges by enabling users to back up their FIDO2 private signing keys to the cloud storage of passkey management services (PMS). However, it introduces a serious security risk —…
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking
Despite improvements in authentication mechanisms, compromise of online accounts remains prevalent. Therefore, technologies to detect compromise retroactively are also necessary. Service providers try to help users diagnose the security status of their accounts via account…
Microsoft Research India – The lab culture
Watch the founder, former and current leaders, and researchers at the Microsoft Research India lab talk about its unique culture. They reflect on their journeys, growth, and what makes the lab such a great place…
Microsoft Research India – The evolution
Learn about Microsoft Research India’s journey from its inception to becoming a leading research center in computer science in India.
Understanding How Users Prepare for and React to Smartphone Theft
Smartphone theft is common, yet little research explores how users prepare for or respond to such incidents. To address this gap in the literature, we conducted 20 semi-structured interviews with victims who had experienced smartphone…