Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








109 Hits in 7.7 sec

TapLogger

Zhi Xu, Kun Bai, Sencun Zhu
2012 Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12  
Specifically, we utilize an installed trojan application to stealthily monitor the movement and gesture changes of a smartphone using its on-board motion sensors.  ...  Later, when the user is performing sensitive inputs, such as entering passwords on the touchscreen, the trojan application applies the learnt pattern to infer the occurrence of tap events on the touchscreen  ...  The of a detected tap event is within the monitoring window. Pattern Learning in Training Mode The unique ↘↗ pattern of in the phase is the key to tap event detection in our case.  ... 
doi:10.1145/2185448.2185465 dblp:conf/wisec/XuBZ12 fatcat:jcqisfqaanbhfbelg42w47nxo4

A Comparative Evaluation of Implicit Authentication Schemes [chapter]

Hassan Khan, Aaron Atwater, Urs Hengartner
2014 Lecture Notes in Computer Science  
We also leverage our real-world device usage traces to determine the proportion of time these schemes are able to afford protection to device owners.  ...  Finally, we provide an open source implementation of the IA schemes evaluated in this work that can be used for performance benchmarking by future IA research.  ...  We thank Tao Wang, Sarah Harvey, the anonymous reviewers and our shepherd, Alina Oprea, for their helpful comments.  ... 
doi:10.1007/978-3-319-11379-1_13 fatcat:xqkbagr46jgnpl6mmvaq5hfyom

Distinguishing users with capacitive touch communication

Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey Walling
2012 Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12  
This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver.  ...  codes or swipe patterns commonly used on smartphones today.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2348543.2348569 dblp:conf/mobicom/VuBGGHLSW12 fatcat:7a67qijp2vdonlud2bo4psfr6i

Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen

Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey Walling
2014 IEEE Transactions on Mobile Computing  
This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver.  ...  codes or swipe patterns commonly used on smartphones today.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1109/tmc.2013.116 fatcat:3aydqtvuejcihpaegh6lntadwi

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications [article]

David Monschein, Oliver P. Waldhorst
2022 arXiv   pre-print
Furthermore, the number of machine learning models used by mPSAuth is independent of the number of users, thus providing adequate scalability.  ...  We propose mPSAuth, an approach for continuously tracking various data sources reflecting user behavior (e.g., touchscreen interactions, sensor data) and estimating the likelihood of the current user being  ...  ACKNOWLEDGMENTS This work was funded by the German Federal Ministry of Education and Research (BMBF), RefNr. 16KIS1142K.  ... 
arXiv:2210.04777v1 fatcat:7gw5kek4orfqfhveqwwbse5ubm

KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction [chapter]

Benjamin Draffin, Jiang Zhu, Joy Zhang
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This comes with a False Acceptance Rate (FAR) of 32.3% and a False Rejection Rate (FRR) of only 4.6%. Our detection rate after 15 keypresses is 86% with a FAR of 14% and a FRR of only 2.2%.  ...  Protecting the sensitivity of mobile devices yet not burdening users with complicated and cumbersome active authentication methods is of great importance to the security and convenience of mobile computing  ...  This work is supported in part by CyLab at Carnegie Mellon under grants from the Northrop Grumman Cybersecurity Research Consortium and by Cisco under the research award for "Privacy Preserved Personal  ... 
doi:10.1007/978-3-319-05452-0_14 fatcat:rzbbqn7kivchlegaapswovrmva

BoD taps

Luis A. Leiva, Alejandro Català
2014 Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services - MobileHCI '14  
A controlled evaluation with 12 users revealed that BoD Taps and BoD Shapes perform equally good at unlocking the device, but BoD Taps allows users to enter passwords about twice faster than BoD Shapes  ...  Moreover, BoD Taps is perceived as being more usable and less frustrating than BoD Shapes, either using one or two hands.  ...  We also thank the anonymous MobileHCI reviewers for providing suggestions to strengthen this paper.  ... 
doi:10.1145/2628363.2628372 dblp:conf/mhci/LeivaC14 fatcat:eebx7gyporbkfpcfjq6f6bpvc4

Security, Privacy, and Usability in Continuous Authentication: A Survey

Ahmed Fraz Baig, Sigurd Eskeland
2021 Sensors  
The security issues are mainly poor matching rates and the problems of replay attacks.  ...  Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics  ...  Battery consumption is one of the paramount issues in a smartphone.  ... 
doi:10.3390/s21175967 pmid:34502865 fatcat:xe6k46sdhbhexioz24wbbn74me

Aporias of the touchscreen: On the promises and perils of a ubiquitous technology

Timo Kaerlein
2012 NECSUS. European Journal of Media Studies  
Additionally, touchscreens are prone to scratches when carried around in a pocket or handbag, which then necessitates the use of unattractive protective sheets.  ...  lie not so much in the touchscreen itself, but in the chrome casing and weight of the device.  ...  About the author Timo Kaerlein is a doctoral researcher in the DFG-funded Research Training Group 'Automatisms' at the University of Paderborn (Germany).  ... 
doi:10.5117/necsus2012.2.kaer fatcat:vi24h32ztrenjgygbc3ulj6drq

Case Study on the Knowledge Transfer and Innovation Structure at CERN

Bruno Silva de Sousa, Alberto Di Meglio, Gianluigi Viscusi
2019 Zenodo  
We identify weaknesses that deserve open discussion within the Organization and propose a set of mitigation recommendations.  ...  Through the case study methodology and interviews with four senior managers at CERN, positioned at different levels of the innovation pipeline, we identify and characterize the internal dynamics that are  ...  In the case of a legal pursuit -to protect its intellectual propertyhow would the Member States and the public in general interpret such action?  ... 
doi:10.5281/zenodo.3560838 fatcat:7q6lgyls5vgrjb6b4qbhdemwzq

Jailbreak!: What Happens When Autonomous Vehicle Owners Hack into Their Own Cars

Michael Harry Sinanian
2017 Social Science Research Network  
of their smartphones. 19 This activity did not have the protection of the copyright system until 2010. 20 In the smartphone context, jailbreaking has been used to unlock all sorts of functionality  ...  far as to hire a member of the jailbreak community. 26 OEMs could similarly "collaborate" with the jailbreaking community, benefiting from their detection of bugs which could otherwise be used by malicious  ... 
doi:10.2139/ssrn.2900887 fatcat:nlueiegdarg3rlokn2ve62ez4q

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
2018 IEEE Communications Surveys and Tutorials  
A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables  ...  Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases.  ...  ACKNOWLEDGMENT The authors would like to thank Jacqueline Brendel for her insightful discussion on the security of cryptographic protocols used in SDP.  ... 
doi:10.1109/comst.2017.2748278 fatcat:yivmyok3bzfilmkxkpfhdwnbmy

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Sandeep Gupta, Attaullah Buriro, Bruno Crispo
2018 Mobile Information Systems  
On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing.  ...  Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability.  ...  Acknowledgments is project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement no. 675320.  ... 
doi:10.1155/2018/2649598 fatcat:dulbgwxnbnd53bnhalsisrxqly

Designing And Supporting Technology Assisted Inclusive Learning For Disaster Preparedness: A Case Study Of Bangladesh

Syed Ali Tarek, C Jones, J Enriquez-Gibson
2017 Zenodo  
A design log, a content specification and two sources of feedback from expert and general user evaluators were used to collect data for the development cycle of the content and the interface.  ...  'Rapid ethnography' and 'Participatory action research' were the key research strategies that were used in the fieldwork and interview and observation methods were used to collect the data.  ...  they could use a feature phone, and advanced users were those who were using basic smartphones.  ... 
doi:10.5281/zenodo.1162788 fatcat:lbipr4geafg3rhccu5xfh75bsq

Two Birds with One Phone: The Role of Mobile Use in the Daily Practices of Remote Information Work

Vedant Das Swain, Shane Williams, Adam Fourney, Shamsi T. Iqbal
2022 2022 Symposium on Human-Computer Interaction for Work  
These results highlight the role of the mobile device in facilitating a future with flexible work practices to rethink traditional "desk jobs".  ...  We found that even though mobiles were used for meetings at home, majority of mobile use was for short nonwork activities.  ...  Only 7 of the 16 participants from that study owned touchscreen mobiles.  ... 
doi:10.1145/3533406.3533416 fatcat:4azxzpbjojdmvjm4v3aro7qjrm
« Previous Showing results 1 — 15 out of 109 results