Protecting Mobile Users From Visual Privacy Attacks Mahmud Al-Noor Tareq Department of Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
AVIATION SAFETY & SECURITY LECTURE 6 X-RAY TECHNOLOGY & BASIC EQUIPMENTS.
Advertisements

What Makes Up a PC?. Objectives At the end of this session, you will be able to: List the various input devices.
On The Air Net Training and Support for Narrow Band Emergency Messaging System Emergency Radio Communications Operations Operational since 2008!
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Lance Spitzner
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
A Mobile-Cloud Pedestrian Crossing Guide for the Blind
TEMPLATE DESIGN © Bluetooth Login Key RIT Computer Engineering Senior Design Project Tim Wesley, Dan Chen Spring 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
- Talkback with Dark screen Rapid key input and Speak PW - Font Size - Negative Colors - Magnification gestures - Notification reminder - Colour adjustment.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Looking to Build a Secure Enterprise Mobile Application? Here’s How! Mush Hakhinian Chief Security Architect Intralinks Mush Hakhinian Chief Security Architect.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Presented by: Sarah Wong Orthoptist II Orthoptic Unit QA 2011.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Can We Predict Eat Out Behavior of a Person from Tweets and Check-ins? Md. Taksir Hasan Majumder ( ) Md. Mahabur Rahman ( ) Department of Computer.
User Interface Toolkit Mechanisms For Securing Interface Elements Franziska Roesner, James Fogarty, Tadayoshi Kohno Computer Science & Engineering DUB.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Exploring Different Localization Technologies Lucy Huh Master’s Electrical and Computer Engineering.
Android Mobile Security Krystal Salerno. Introductions.
Display Screen Equipment - Users. Workstation EquipmentEnvironment DeskMonitorLighting ChairHard DriveHeating FootrestMouseNoise KeyboardHumidity What’s.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Information Security What is Information Security?
Ministry of Education and Science of the Republic of Kazakhstan Bologna Process and Academic Mobility Center Astana, 2013 Seidakhmetova R. Director of.
Incident Security & Confidentiality Integrity Availability.
Design Elements of Graphical Representation, (Factors supporting appearance and functionality of solutions). P0CCUAA.
1 CP586 © Peter Lo 2003 Multimedia Communication Visual Interface Design & Product Design.
Wireless Intrusion Prevention System
Chapter 2 Securing Network Server and User Workstations.
Access Methods and Strategies EDUC 477/689O Devices Part III-A.
AT&T Privacy Bird Screen Shots For more information see
FriendFinder Location-aware social networking on mobile phones.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
The ambient light sensor in a smart phone is what measures how bright the light is. It’s the phones software that adjusts the brightness in the display.
OLSP Spring Online Learning Support Project Team
MICROCONTROLLER DETECTION SYSTEM Joshua Bosiljevac EKU.
0Copyright 2014 FUJITSU New Zealand Limited FUJITSU CONFIDENTIAL UNLESS SPECIFIED OTHERWISE Microsoft CRM Tablet App for Dynamics CRM 2013 Travis Chen.
Scientific Engineering Center ''Nuclear Physics Research (''YAFI'') St-Petersburg, RUSSIA 2014.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Best Practices Session Tips for Effective Mobile Assessments ID Jeff Place
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Preliminary Design Review Team 18 October XX, 2015 Department of Electrical and Computer EngineeringAdvisor: Csaba Andras Moritz.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
By, T.Aathmanesan.. Everybody knows about pollution, in fact is a part of our lives today. Definition : “Presence of contamination in the environment.
WELCOME Mobile Applications Testing
O/o The Chief Electoral Officer, AP & Telangana
Using Jabber in Global Offices
Firewalls.
Adaptable safety and security in v2x systems
Pradeo Security Systems
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
Internet of Things Vulnerabilities
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
12 STEPS TO A GDPR AWARE NETWORK
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Android Sensor Programming
Understanding Android Security
The MobileIron® Threat Detection difference:
16. Account Monitoring and Control
Presentation transcript:

Protecting Mobile Users From Visual Privacy Attacks Mahmud Al-Noor Tareq Department of Computer Science and Engineering (CSE), BUET  An increasing number of people use mobile devices in public places such as trains, airports, and restaurants.  Visual privacy attack: Un-authorized visual access of the mobile display by bystanders.  ComRes [1] survey: 71% of the surveyed people have been able to see or read what someone is doing on their computing device Unauthorized people seeing sensitive information could lead to financial loss or public exposure Enable mobile users to combat visual privacy attacks, i.e., to work privately on their mobile devices in public places. Also ensure full control of user in the monitoring process.  Select sensitive applications or tasks to monitor.  Check for intruder using face detection [2].  Develop linear regression model to determine the distance measured from eye distance, and the angle of the detected faces.  Apply Snellen chart [3] to determine if the displayed text is readable by the bystander.  Check whether the bystander is in a friendly distance or an intruder.  Notify user accordingly analogous to traffic lights. Figure: A user and two bystanders close to the screen (left), and a login screen with high privacy risk indicated by a red light on the top-left corner (right) Figure: A user and two bystanders far away from the screen (left), and a login screen with no privacy risk indicated by a green light on the top-left corner (right) We have developed an Android Application named iAlert. User can select which applications need to be monitored. When a secured app is started, iAlert opens a camera and checks for visual security risks. It shows green, yellow and red signals. Figure: user can select which apps to monitor from a list (left), and user can set monitoring behavior (right) Figure: A secured app launched. So a small camera is started. Green signal indicates no bystander (left), and red signal on top-left corner indicates the presence of a bystander (right) Reactive Solution iAlert-  Combats problem of visual privacy attacks  Enables a mobile user to be aware of the surrounding environment and possible privacy risks  Facilitates working in private at public places  Provides full user control by sensitive application select option and other settings, i.e., camera size, position and scan time.  Can differentiate intruders from friendly shares from face position.  Developing methods for automatically adjusting screen or font size based on visual privacy risks for sensitive tasks.  Identifying highly sensitive areas (e.g., user name Textbox) of applications and ensuring strong privacy for these highly sensitive parts. [1] eu/wp-content/ uploads/2012/07/Visual-Data- Security-White-Paper.pdf [2]Face detector. ference/android/media/FaceDe tector.Face.html [3]Eye chart. g/collection/cub_/activities/cub _human/cub_human_lesson06 _activity1_eyechart.pdf Objective Visual Privacy AttacksDetecting Visual Privacy Attacks Conclusion Future Works References Our Solution Android Device Implementation