Mobile Authentication Swadhin Pradhan Group Presentation.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Shala Sylvester, Dejah Sanford, Stephanie Hicks, Tierra Beason.
Marjie Rodrigues
Security-Authentication
Design Problems  Limited Market  Too Many Other Devices  No Standard Design Among Devices.
Stephen Masiclat Director, Graduate Program in Media Management The S.I. Newhouse School of Public Communications Syracuse University.
Phone guide for people over 65. Not Smart Phones.
Android 5.0 “Lollipop” Eric Moore Computer Users Group of Greeley February 14, 2015.
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
On the Security of Picture Gesture Authentication Ziming Zhao †‡, Gail-Joon Ahn †‡, Jeong-Jin Seo †, Hongxin Hu § † Arizona State University ‡ GFS Technology.
Wireless iPhone uses quad-band GSM, the global standard for wireless communications. It also supports Cingular’s EDGE network, b/g Wi-Fi, and Bluetooth.
July 25, 2010 SensorKDD Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer &
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion Liang Cai and Hao Chen UC Davis.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
TOUCHSIGNATURES Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Newcastle University CryptoForma meeting, Belfast 4 May 2015.
Larry Shi Computer Science Department Graduate Research Mini Talk.
ISmart for iDevices Apple iPad/iPhone/iPod By Tamara Ottum, MxCC Librarian Updated by Sandra Couture, MxCC Ed Tech Specialist.
Biometrics Authentication Technology
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
PHABLETS By: Joey Horne. WHAT IS A PHABLET?  PH one-t ABLET  Phablets are essentially smartphone-tablet hybirds.  Screen sizes between 5-6 inches 
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Lecture 1: Getting Ready Topics: People and Course Overview Date: Jan 12, 2016.
A CCELEROMETER. Accelerometers are devices that can measure acceleration, but in smartphones, they're able to detect changes in orientation and tell the.
Sensors For Mobile Phones  Ambient Light Sensor  Proximity Sensor  GPS Receiver Sensor  Gyroscope Sensor  Barometer Sensor  Accelerometer Sensor.
App Inventor You are going to use App Inventor to make an application for your phone Smart Phone ‘s can hold many entertaining apps due to the amount of.
Computer Applications I I dentify alternative input devices and techniques.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Computer Security Set of slides 8 Dr Alexei Vernitski.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
By: Shane Serafin.  What is handwriting recognition  History  Different types  Uses  Advantages  Disadvantages  Conclusion  Questions  Sources.
An Introduction to Biometrics
Mobile phone sensors. Sensors Sensors gyroscope The gyroscope is a sensor that can provide orientation information as well. This sensor can tell how.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
A device tat transfers data from the outside world into a computer
Access control techniques
What this activity will show you
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fun gym Cambridge Nationals R001.
Setting up an online account
Welcome To Money pad November 23, 2018 Sample footer.
Anindya Maiti, Murtuza Jadliwala, Jibo He Igor Bilogrevic
A SEMINAR REPORT ON BIOMETRICS
Managing and Monitoring Screen Time
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Presentation transcript:

Mobile Authentication Swadhin Pradhan Group Presentation

Single Level Authentication How do we unlock phones ? How do we login to different mobile apps ? One-time passwords, Biometric passwords.. Different perils : unwanted in-app purchases … Shoulder Surfing, Smudge Attack with common Password Attacks..

Smartphone and Users As of 2013, over 90% of Americans claimed to own phones, the majority of whom use their devices to access the Internet, check , or use third party applications (~50% store banking information). [Pew Internet Research] Smartphones are for surfing the web, checking social networks or playing games than making phone call [5 th activity by Mobile Network O2]

General Password Behavior A landmark Microsoft study from 2007 found that the typical Web user had 25 accounts (In 2012, Experian revealed that the average year old had 40 accounts online.) but only 6.5 unique passwords to protect them. A 2014 SplashData report cited "123456" as the most common credential, having overtaken longstanding champion "password. Password-cracking techniques such as offline dictionary attacks have become increasingly efficient. Last year, after Ars Technica gave three experts an encrypted password file with 16,000 entries, one of the individuals successfully revealed 90 percent of them.

Freemium Smartphone App Revenue 2012 report by the Pew Internet Project estimated that nearly a third of cell phone users have had a device lost or stolen (~$30 billion per year loss). Google will be refunding $19 million to consumers who were charged for inadvertent in-app purchases made by their kids on the Play Store. ( 71% of total iPhone app revenue comes from in-app purchases from freemium apps; 2,000 adults surveyed, 28% said that their children did in-app purchases)

Unlocking Behavior ~70% of the people lock their devices (Soups ‘13 and CCS ’14) from preserving their privacy from strangers or family members. According to a study released by app maker Locket, the average person unlocks his or her phone 110 times each day (from its 150,000-plus users and even some people are around 900!).

Google’s Smart Lock (On body detection) Uses Accelerometer

Different Smartphone Locking Techniques Nothing (simple swipe ) (Soups ‘13 paper ~200 users – 35% no lock) Pattern based unlocking. (Soups ‘13 – 51%) ~3.2s PIN/Text based unlocking. (Soups ‘13 – 14%) ~1.5s – People prefer Pattern more (Mobile HCI ‘13) Finger print based unlocking (Biometric based) – Apple fingerprint scanner – Samsung fingerprint scanner

Text/Pin based Password In most apps/services, we use textual passwords. Even in smartphones, 15% of the time, it is used. Prone to common password guessing techniques, grammatical/factual relation among different passwords (Soups ‘12), derived from personal information easily available in social networks (CCS ‘11) etc.

Pattern based Password Error prone and ~20% of the time pattern based password has to be repeated twice (Soups ‘13, Mobile HCI ‘12). Touch screen based spatial feature based attack (Mobile HCI ‘12) or temporal feature based attack can be done. Implicit Authentication based on Touch Screen Patterns (38 participants, Horizontal – Vertical – Two finger vertical, DTW {XY Coordinate, Pressure, Size, Time, Speed}, False Acceptance 21% and False Rejection 19%) [CHI ‘12].

Pattern based Password Biometric-Rich Gestures: A Novel Approach to Authentication on Multi-touch Devices (CHI ‘12) (Five-finger touch gestures - 90% accuracy with single gestures, significant improvement when multiple gestures performed in sequence.) Secure unlocking of mobile screen based on Gestures (Mobicom ‘13) (How they input – finger velocity, device acceleration, stroke time; samples from 50 volunteers; End system 0.5% error rate with 3 gestures.)

Keystroke based Authentication Keystroke based user identification of smartphones with 25 users mainly using PIN has got low accuracy (RAID 2009). And there are also some works on devices with physical keyboard. User Verification on Smartphones via Tapping Behaviors (Tech report 2014) (Four features (acceleration, pressure, size, and time) from accelerometer, gyroscope, and touch screen sensors; 80 users and 3.65% error rate)

Gait based Authentication Some schemes have been proposed that utilize accelerometer in smart phones to authenticate users based upon their gaits -(ICASSP 2005, SensorKDD 2011, ). Such schemes have low true positive rates because gaits of people are different on different types of surfaces such as grass, road, snow, wet surface, and slippery surface. The movement the user performs when answering (or placing) a phone call (ASIACCS 11)

ITUS: Implicit Authentication Architecture (Mobicom 2014)

Dynamic Question(Usage) based Authentication I Know What You Did Last Week! Do You? Dynamic Security Questions for Fallback Authentication on Smartphones (CHI 2015) – Questions based on App usage, App installations, SMS etc. – 95.5% - 100% accuracy with 3 question based system. ActivPass : Your Daily Activity is your Password (CHI 2015) – Questions based on outlier activities from facebook, web, and smartphone activities. – 95% success with final 3 Question based system.

Sensors as Side Channels HotMobile 2012 paper ‘ACCessory’ shows that accelerometer measurements can be used to extract 6-character passwords in as few as 4.5 trials (median). (also TouchLogger Usenix HotSec ‘11). Microphone, Camera, GPS information also can leak security information (MobiHeld 2009).

Smudge Attack Oily residues, or smudges, on the touch screen surface, are one side effect of touches from which frequently used patterns such as a graphical password might be inferred. Guessing space can be reduced by around ~50% (Usenix Security Workshop Woot ’10)

Shoulder Surfing Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information – is a problem that has been difficult to overcome. Now You See Me, Now You Don’t – Protecting Smartphone Authentication from Shoulder Surfers (CHI 2014) – Hiding some parts of the patterns. Back of the Device Authentication on Smartphones (CHI 2013).

Two factor Authentication Two step  Two factor authentication ? Extra device needed for another level of security.. Smartphone for laptop/desktop (SMS reply, or SMS code to put in textboxes in laptop, or putting App based codes)? Smartphone for Smartphone ? Wearable for Smartphone ?

Example

Google buys SlickLogin SlickLogin lets users log into a website on your computer by holding your phone within a few inches of it. They claim to use uniquely generated sounds intentionally made inaudible to the human ear. Your computer plays the sound through its speakers, while an app on your smartphone uses the device’s built-in microphone to pick up the audio. Same Idea: Unlaunched payments service Clinkle, SonicNotify is using the concept to let TV advertisers and retail stores send content to handsets, Chirp is trying to build an entire file transfer protocol based on the idea.

SoundProof Paper Ambient sound from Laptop and smartphone. Here, second authentication factor is the proximity of the user’s phone to the device being used to log in. The proximity of the two devices is verified by comparing the ambient noise recorded by their microphones. Sound-Proof can be easily deployed as it works with major browsers without plugins.

Wearable as Second Authentication in Two-factor Authentication Motion biometrics can be used – Similar to vital biometrics, this would require that a smartwatch have a sophisticated motion detector like Apple’s M7 chip in the iPhone 5S. Voice Biometrics through hotwords (“Ok Google” or “Hi Galaxy”) or passvoices.

Wearable as Second Authentication in Two-factor Authentication Passthoughts used by wearable EEG headsets and they claim to get around 99% accuracy. (UbiComp 2014 paper) Smartwatch gesture recognition can be used (HotMobile 14 – not explicit)

Ideas for Implicit Authentication (IA) for Single or Two Factor Authentication

A Few Ideas Application usage trails of different users (How different users use different applications) – Single Implicit Authentication Sensor signature similarity between wearables (e.g. smartwatch) and smartphone – Implicit Two-factor Authentication Soft Biometrics from wearables (Nymi – ECG from heart, Fitbit – Accelerometer data of running..) - Single Implicit Authentication

Thanks