{"created":"2026-03-25T05:07:09.781902+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02008967","sets":["6164:6165:6462:1754030301959"]},"path":["1754030301959"],"owner":"11","recid":"2008967","title":["AD-DP: Device-Aware Anomaly Detection for Securing WebAuthn Passkey Authentication"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-10-20"},"_buckets":{"deposit":"6793000b-589f-4a25-b10c-9697c75a1174"},"_deposit":{"id":"2008967","pid":{"type":"depid","value":"2008967","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"AD-DP: Device-Aware Anomaly Detection for Securing WebAuthn Passkey Authentication","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"AD-DP: Device-Aware Anomaly Detection for Securing WebAuthn Passkey Authentication","subitem_title_language":"ja"},{"subitem_title":"AD-DP: Device-Aware Anomaly Detection for Securing WebAuthn Passkey Authentication","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2025-10-20","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"立命館大学"},{"subitem_text_value":"LY Corporation / 立命館大学"},{"subitem_text_value":"LY Corporation "},{"subitem_text_value":"立命館大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Ritsumeikan University"},{"subitem_text_value":"LY Corporation / Ritsumeikan University"},{"subitem_text_value":"LY Corporation"},{"subitem_text_value":"Ritsumeikan University"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2008967/files/IPSJ-CSS2025196.pdf","label":"IPSJ-CSS2025196.pdf"},"date":[{"dateType":"Available","dateValue":"2027-10-20"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2025196.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ab35acc1-0f17-49bc-89a5-97e4dfea0751","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Khin, Win Myat Mon"}]},{"creatorNames":[{"creatorName":"山口, 修司"}]},{"creatorNames":[{"creatorName":"五味, 秀仁"}]},{"creatorNames":[{"creatorName":"上原,哲太郎"}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Khin Win Myat Mon"}]},{"creatorNames":[{"creatorName":"Shuji Yamaguchi"}]},{"creatorNames":[{"creatorName":"Hidehito Gomi"}]},{"creatorNames":[{"creatorName":"Tetsutaro Uehara"}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The evolution of FIDO2/WebAuthn from device-bound credentials to cloud-synced passkeys has opened new attack surfaces that traditional cryptographic checks cannot detect. In particular, attackers can exploit by using valid passkeys from unassociated or malicious devices and enabling Man-in-the-Middle (MitM) threats such as those shown in the CTAP Hijacking attack academic paper. This paper introduces AD-DP (Anomaly Detection through Device Profiling), a server-side enhancement designed to close this security gap. AD-DP framework establishes a trusted relationship between users, credentials, and devices by profiling authentication behavior over time. It enables Relying Parties(RPs) to detect anomalous device usage before completing WebAuthn flows, providing an additional layer of real-time defense without modifying the standard protocol. We present the rationale for the design, the architectural components, and an evaluation plan. Our proposal addresses a critical gap in WebAuthn authentication by enabling servers to assess the legitimacy of the authenticating device, not just the credential, within existing authentication flows.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1476","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2025論文集"}],"bibliographicPageStart":"1470","bibliographicIssueDates":{"bibliographicIssueDate":"2025-10-20","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"links":{},"id":2008967,"updated":"2026-03-26T04:36:36.912024+00:00"}