Contextual Proximity Detection in the Face of Context-Manipulating Adversaries

نویسندگان

  • Babins Shrestha
  • Nitesh Saxena
  • Hien Thi Thu Truong
  • N. Asokan
چکیده

Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems. We present a systematic assessment of co-presence detection in the presence of a contextmanipulating attacker. First, we show that it is feasible to manipulate, consistently control and stabilize the readings of different acoustic and physical environment sensors (and even multiple sensors simultaneously) using low-cost, off-the-shelf equipment. Second, based on these capabilities, we show that an attacker who can manipulate the context gains a significant advantage in defeating context-based co-presence detection. For systems that use multiple sensors, we investigate two sensor fusion approaches based on machine learning techniques – features-fusion and decisions-fusion, and show that both are vulnerable to contextual attacks but the latter approach can be more resistant in some cases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The contextual map: detecting and exploiting affinity between contextual information in context-aware mobile environments

Context-aware computing generally focuses on abstracting the situation of individual entities, such as persons, places and objects, making this information available for further computational exploitation. Those resulting entities’ contexts allow a wide spectrum of application cases in various domains, foremost in mobile computing and internet applications. With contexts from multiple entities ...

متن کامل

Proximitäts- und Aktivitätserkennung mit mobilen Endgeräten

With the now widespread usage of mobile devices such as smartphones and tablets as well as body-worn technical gear (Wearables), the vision of a world in which computing resources are ubiquitously available has become reality. Based on these pervasively available technologies, context-aware applications, i.e., applications adapting their provided services to a user’s current situation, are beco...

متن کامل

Secure platforms for enforcing contextual access control

Gupta, Aditi Ph.D., Purdue University, December 2014. Secure Platforms for Enforcing Contextual Access Control. Major Professor: Elisa Bertino. Advances in technology and wide scale deployment of networking enabled portable devices such as smartphones has made it possible to provide pervasive access to sensitive data to authorized individuals from any location. While this has certainly made dat...

متن کامل

Investigating disagreements through a context-specific approach: A case of Iranian L2 speakers

The  current  study  investigated  the  expression  of  disagreement  by  Iranian  advanced  English learners.  The  data  for  the  study  comprised  the  recorded  discussions  of  26  male  and  female interlocutors  in  three  different  settings:  1)  language  institute,  2)  home  environment,  and  3) university  setting.  Analysis  of  the  arguments  pointed  to  the  influence  of  c...

متن کامل

PyramidBox: A Context-assisted Single Shot Face Detector

Face detection has been well studied for many years and one of the remaining challenges is to detect small, blurred and partially occluded faces in uncontrolled environment. This paper proposes a novel context-assisted single shot face detector, named PyramidBox, to handle the hard face detection problem. Observing the importance of the context, we improve the utilization of contextual informat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1511.00905  شماره 

صفحات  -

تاریخ انتشار 2015