Decoy Applications for Continuous Authentication on Mobile Devices

نویسندگان

  • Malek Ben Salem
  • Jonathan Voris
  • Salvatore J. Stolfo
چکیده

Mobile devices and applications carry a great deal of sensitive and personally identifiable information, which makes them very lucrative targets for attackers. Authentication on these devices is vulnerable to smudge attacks [1]. Furthermore, their small size, light weight, and ubiquity makes them easily stolen. According to the Cloud Security Alliance, data loss from lost, stolen, or decommissioned mobile devices is the single largest threat to mobile computing [5]. The nature of user interaction with mobile devices calls for novel authentication approaches that are robust and secure, usable, and inexpensive. In a mobile context, security solutions must be flexible as well as resource e cient to ensure compatibility with a broad platform base. We propose the use of decoy apps on mobile devices to continuously authenticate users once the user is logged in– i.e. throughout the user session– and to detect suspicious activity by a masquerader, or unauthorized user posing as the owner and legitimate user of the mobile device. Decoy apps are authentic-looking apps that hold fake but enticing information to the potential masquerader. They may be installed manually by the device owner or automatically through some app distribution and installation service. Once installed on the mobile device, their only function is to act as bait to the masquerader. They are not to be used by the device owner, and therefore any access to decoy apps is highly indicative of potential masquerade activity. We conjecture that decoy apps can be used to continuously authenticate users once logged-in to the mobile device throughout an entire user session. Access to any decoy app could be a trigger for de-authenticating the user. Furthermore, we posit that even if a masquerader were aware decoy apps are loaded on the device, they would lack the user’s knowledge of which apps are real or decoys. Figure 1 displays a notional view of the conundrum faced by the attacker. In this paper, we present an approach for deploying decoy apps to (de-)authenticate mobile device users. The remainder of this paper is organized as follows. First we will briefly describe how mobile decoy apps can be created, dis-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Continuous User Authentication on Mobile Devices

Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, one has to constantly worry about the security and privacy as the loss of a mobile device could compromise personal information of the user. To deal with this problem, continuous authentication (also ...

متن کامل

A Prototype Implementation of Continuous Authentication for Tactical Applications

Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper presents the details of prototyping act...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014