406 Hits in 1.8 sec

Multi-sensor authentication to improve smartphone security [article]

Wei-Han Lee, Ruby Lee
2017 arXiv   pre-print
In this paper, we propose a multi-sensors-based system to achieve continuous and implicit authentication for smartphone users.  ...  Our goal is to design a mechanism for smartphones to better authenticate the current user, continuously and implicitly, and raise alerts when necessary.  ...  Gunes Kayacik at Glasgow Caledonian University for providing us the GCU data set.  ... 
arXiv:1703.03378v1 fatcat:tc3pfl6onzc35lubnuihwtis2e

A Systematic Literature Review of Behavioural Profiling for Smartphone Security: Challenges and Open Problems

Saud Alotaibi, Abdulrahman Alruban
2017 International Journal for Information Security Research  
Current authentication approaches do not re-authenticate in order to re-validate the user's identity after the user has initially accessed the mobile phone.  ...  The main aim of this research study is to conduct a systematic review of the current research literature regarding behavioural profiling for smartphone security.  ...  A transparent and continuous authentication mechanism, behavioural biometrics provides a basis for convenient and secure re-authentication of the user and gathers user data in the background, without requiring  ... 
doi:10.20533/ijisr.2042.4639.2017.0085 fatcat:il3m4z52gjhx5mlosecypayezi

Proximity based IoT device authentication

Jiansong Zhang, Zeyu Wang, Zhice Yang, Qian Zhang
2017 IEEE INFOCOM 2017 - IEEE Conference on Computer Communications  
As a consequence, traditional Pre-Shared Key (PSK) based authentication for mobile devices becomes difficult to apply.  ...  Motivated by this realworld security vulnerability, in this paper we propose a novel proximity-based mechanism for IoT device authentication, called Move2Auth, for the purpose of enhancing IoT device security  ...  In this paper, we propose a proximity based mechanism for smartphone to authenticate IoT devices, called Move2Auth.  ... 
doi:10.1109/infocom.2017.8057145 dblp:conf/infocom/ZhangWYZ17 fatcat:jsu5y5fpo5dpnjitlcu2nnmzyq

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
This paper highlights the potential risks that occur when smartphones are stolen or seized, discusses the concept of continuous authentication, and analyzes current approaches and mechanisms of behavioral  ...  These devices have provided new avenues for consumers to play, work, and socialize whenever and wherever they want.  ...  Xue, “Unobservable re-authentication for and non-authorized persons.  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case [article]

Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti
2016 arXiv   pre-print
We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers  ...  To show that our system can be generalized, we test its performance on touch data from smartphones and found the accuracy to be similar to smartglasses.  ...  Unobservable Re-authentication for Smartphones. In 20th Annual Network and Distributed System Security Symposium, NDSS ’13.  ... 
arXiv:1412.2855v8 fatcat:ale2hmhegzcr5nggpjdxj5n7na

Security Analysis of Smartphone Point-of-Sale Systems

WesLee Frisby, Benjamin Moench, Benjamin Recht, Thomas Ristenpart
2012 Workshop on Offensive Technologies  
We experimentally investigate the security of several smartphone point-of-sale (POS) systems that consist of a software application combined with an audio-jack magnetic stripe reader (AMSR).  ...  Lack of command authentication. For all commands but the one used to enter bootloader mode, the AMSR did not perform authentication of the source of the commands.  ...  Inserting a unobserving hardware skimmer would still be challenging. ROAM Data.  ... 
dblp:conf/woot/FrisbyMRR12 fatcat:ckat7ws2uneu5eqne47zab6cle

Open Sesame: Design Guidelines for Invisible Passwords

A. Bianchi, I. Oakley, Dong-Soo Kwon
2012 Computer  
For example, users can correct PIN errors by re-entering their PIN (by simply reselecting a target) or using the back button to delete a single PIN item.  ...  Figure 3 . 3 Prototypes using counting techniques for PIN entry: (a) spinlock, a countingbased prototype for touchscreen smartphones, and (b) timelock, which delivers cues by dwell duration and uses an  ...  Selected CS articles and columns are available for free at  ... 
doi:10.1109/mc.2012.109 fatcat:sr6juod6pjbmbkjdrlmw3h7zfe

Anticounterfeiting Labels with Smartphone‐Readable Dynamic Luminescent Patterns Based on Tailored Persistent Lifetimes in Gd 2 O 2 S:Eu 3+ /Ti 4+

Ngei Katumo, Luis Arturo Ruiz‐Preciado, Vinay Kumar, Gerardo Hernandez‐Sosa, Bryce S. Richards, Ian A. Howard
2021 Advanced Materials Technologies  
N.K. and V.K. thank the German Academic Exchange Service, DAAD, for financial support and Karlsruhe School of Optics and Photonics (KSOP) for training.  ...  G.H.S. and L.A.R.P. acknowledge funding by the German Federal Ministry for Research and Education (BMBF) through the project FKZ: 03INT606AG.  ...  These results inspire further work to focus on expanding the usage of smartphones coupled with phosphors engineered to have appropriately delayed luminescence lifetimes for robust quantitative authentication  ... 
doi:10.1002/admt.202100047 fatcat:uazbsugkqbczfiedmaas7b42he

E-Banking Security Study - 10 years later

Kamil Malinka, Ondrej Hujnak, Petr Hanacek, Lukas Hellebrandt
2022 IEEE Access  
PSD2 brings new requirements for multi-factor authentication, thus it is necessary to revise compliance of currently used schemes.  ...  With the Payment Services Directive (PSD2) for European Union coming into force, we believe it is a good time to update our findings.  ...  Secure Hardware in Smartphones Because modern banktrends focus on smartphones and mobile banking, we describe the possibilities of smartphones in detail.  ... 
doi:10.1109/access.2022.3149475 fatcat:s3iucqwd7zeqhoqhdhkarbpei4

Disruptive Teaching Methodology for STEM Education

Ajay Krishnan M., Amol Deshpande
2021 Journal of Engineering Education Transformations  
This paper talks about an attempt on implementing a new disruptive teaching methodology based on COMSOL Applications as a teaching aid for the Computational Fluid Dynamics Laboratory (based on Transport  ...  Res. Sci. Teach. 48, 71 (2011). [11] Z. H. Zhang, M. C. Linn, Can generating representations enhance learning with dynamic visualizations?, J. Res. Sci. Teach. 48, 1177 (2011). [12] L.  ...  Res. 7, 010101 (2011). [13] K. W. McElhaney, M. C. Linn, Investigations of a complex, realistic task: Intentional, unsystematic, and exhaustive experimenters, J. Res. Sci. Teach. 48, 745 (2011).  ... 
doi:10.16920/jeet/2021/v34i0/157178 fatcat:3mmv4xdrarevlpyfpmotdznx7q

Indexing authenticity in visual political (social media) communication: a metapragmatics-based analysis of two visual registers of the authentic

Lisa Blasch
2021 Multimodal Communication  
as sensory and affective experience of "now") and (2) "voyeuristic fictionalization" (comprising indexicals associated with fiction genre, and based on the notion of authenticity as arising via "unnoticed  ...  metapragmatics-based approach to visual communication, combined with adapted concepts of Social Semiotics ("visual modality") and CDA-oriented visual analysis ("canons of use"), to reconstruct two visual registers of authenticity  ...  smartphone) photography (cf. Meier 2015: 98-102).  ... 
doi:10.1515/mc-2020-0019 fatcat:sk2hgc4l2vhb7gbuawt6vbanry

Smartphone App Usage Analysis: Datasets, Methods, and Applications

Tong Li, Tong Xia, Huandong Wang, Zhen Tu, Sasu Tarkoma, Zhu Han, Pan Hui
2022 IEEE Communications Surveys and Tutorials  
Our survey summarizes advanced technologies and key patterns in smartphone app usage behaviors, all of which have significant implications for all relevant stakeholders, including academia and industry  ...  As smartphones have become indispensable personal devices, the number of smartphone users has increased dramatically over the last decade.  ...  Yong Li for all of the support and valuable discussions.  ... 
doi:10.1109/comst.2022.3163176 fatcat:yj656343ovevdldtiw6vf254ue

VirtualFriendship: Hiding interactions on Online Social Networks

Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore
2014 2014 IEEE Conference on Communications and Network Security  
Drac [17] proposes an architecture to provide anonymity and unobservability for low-volume communications, such as chat messaging.  ...  Further, the authenticity of the message is protected by digital signature. For the authentication, it is hard for an nonauthorized user to access any content from Bob.  ... 
doi:10.1109/cns.2014.6997501 dblp:conf/cns/BeatoCPV14 fatcat:t7c3bnu2hbaexobjwnqtxgbfki

BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior

Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Mengshu Hou
2022 Sensors  
Re-authentication continuously checks to see if a user is authorized during a whole usage session, enhancing secrecy capabilities for computational devices, especially against insider attacks.  ...  However, it is challenging to design a reliable re-authentication scheme with accuracy, transparency and robustness.  ...  Based on the re-authentication results, the MCU builds up user legitimacy model and gives out the final decision for the smartphone (whether to lock the device and force users to log out).  ... 
doi:10.3390/s22093583 pmid:35591274 pmcid:PMC9105168 fatcat:fgouggp6pzhtjmb2rtpjdlwcbq

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses [article]

AKM Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac
2020 arXiv   pre-print
Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations.  ...  However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems as any security or privacy violation can lead to severe  ...  For example, one-factor authentication may be sufficient for blood pressure or temperature readings, but accessing data from healthcare servers may require multi-factor authentication.  ... 
arXiv:2005.07359v1 fatcat:lomlyc27gbgeteoug3gzlgnqd4
« Previous Showing results 1 — 15 out of 406 results