Presentation is loading. Please wait.

Presentation is loading. Please wait.

Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings.

Similar presentations


Presentation on theme: "Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings."— Presentation transcript:

1 Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 501-512. ACM, 2014. Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication Presented by: Roshan Pawar.

2 Summary 2 The paper revisits the concept of Social Authentication (SA) and proposes a system which generates challenges that are robust against the attacks on SA. The paper also demonstrates a novel attack technique against the social authentication, that is more effective and efficient than previously presented techniques. The authors experimentally confirm the robustness of the proposed solution against the three template matching algorithm: The correlation coefficient (CCOEFF), Cross correlation (CCORR) and Squared dierence (SQDIFF). Furthermore, the authors claim that after using the proposed solution the face detection software fails to detect even a single face, whereas users identify their friends in over 94.38% of photos with faces unrecognizable by software.

3 Motivation 3 The main motivation to propose a new design in Social Authentication(SA) was due to the authors confidence in SA as an promising approach in preventing unauthorized access in a user friendly manner. Hence, my focus of presentation would be on authors perspective of preventing unauthorized access.

4 Social Authentication 4 Fig. Shows a typical SA example on Facebook and this is taken from the cited paper ‘Social authentication: harder than it looks’ published in Proceedings Of the 2012 Financial Cryptography and Data Security conference. Springer.

5 Attacks on social authentication 5  Face recognition technique.  The image comparison attacks by creating the collection of images of the victim and his friends. (Novel type of attack demonstrated by authors)

6 Proposed design 6 Steps in the proposed design o Face extraction o Photo categorization. o Tag transformation. o Photo transformation. Then novel transformation process for creating SA challenge to template matching algorithms such as: o The correlation coefficient (CCOEFF). o Cross correlation (CCORR). o Squared dierence (SQDIFF).

7 Evaluation of user study 7 In medium portraits the success rate was 97% And in difficult portraits the success rate was 92.1% Users also identified their friends in 77.7% of the pages that contained the photos of animals.

8 The authors final thoughts 8  The proposed approach could be applied for security services offered by online social networking websites.  In web service to provide the feature of user-specific CAPTCHA.  In banking websites as an addition to two-factor authentication.

9 Personal thoughts 9 The social authentication can be vulnerable if the attacker is a close friend of a victim. To log in through the social authentication setup for a user having a large number of friends, it is fairly difficult to identify the medium and difficult level of photos. How effective is the social authentication in a case of an elderly person or in a case of persons who have low cognitive skills? The Authors consider the SA as a promising approach in preventing unauthorized access, However, I think that:

10 Thank you Questions?


Download ppt "Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, and Angelos D. Keromytis. In Proceedings."

Similar presentations


Ads by Google