Poster: Fine-Grained Locking System for Data and Applications in Smartphones

نویسندگان

  • Ildar Muslukhov
  • Yazan Boshmaf
  • Konstantin Beznosov
  • Jonathan Lester
چکیده

Smartphones have become truly ubiquitous devices and it is hard to imagine our daily life without them. Today’s modern smartphones offer a diverse set of services and rich functionalities, which include gaming, web browsing, emails, GPS navigation, voice search and high definition video. Such rich functionalities attracted a large number of smartphone owners (referred to as users), and as a result, smartphones overtook laptops and desktops in terms of the number of sold items per year [1]. Such success, however, made these devices an attractive target by adversaries, and consequently lead to a growth in the number of malware types on smartphones [5]. The number of lost, misused, stolen or damaged smartphones has also increased over the years [2]. Moreover, adoption of smartphones by companies has created new attack vectors on the corporate data, where sensitive and confidential data are at a greater risk due to the higher mobility of smartphones [3]. A lot of attention has been paid from the research community to the malware threats to data in smartphones [7]. Still, there has been little attention paid to the physical threats, such as theft, loss, damage or malicious use of the device by an adversary. The aforementioned threats might lead to the highly probable risks of an unauthorized data access or data loss. Symantec reports that in 96% of cases when a smartphone is lost, a person who finds it tries to access sensitive data such as social networking applications, emails, pictures, passwords, and banking applications [8]. Furthermore, recent research shows that users do store sensitive data, such as personal pictures, passwords (both in clear and in password managers), email and SMS messages. However, around half of them do not use a locking system (with a PIN-code, Draw-a-Secret or a password ) [9]. The participants of the aforementioned study justified their decision not to use a locking system by the necessity to have an instant access to non-sensitive data and applications in their smartphones. Futhermore, results of this study suggest that a locking system should consider sensitivity of separate data items, because sensitivity depends on the content of a data item, which means that an application could contain sensitive and non-sensitive data. Recent studies show that Authentication Methods (AMs) that are based on a PIN-code or Draw-a-Secret (DAS) do not provide an adequate protection against an adversary who has physical access to the device and who can observe smartphone users. For instance, De Luca et al. [6] showed that most of the users do not protect PIN-codes from eavesdroppers when accessing ATM machines, Zakaria et al. [12] showed that one attempt is enough to capture a DAS authentication secret, and Raguram et al. [11] presented surveillance tools that allows an adversary to capture what users type into smartphones from reflections of the smartphone’s display off other objects in the environment, such as sun glasses. Diverse and dynamic environments where smartphones are being used today make the problem of data protection harder. Oulasvirta et al. [10] showed that users’ interactions with smartphones are usually very short in length and users are frequently distracted (every four seconds) from their smartphones by many external factors, e.g., necessity to look where a users is walking or maintaining a conversation with a friend. Lack of attention makes AMs more vulnerable to eavesdropping attacks, because users do not check whether they are being observed. Furthermore, short nature of users’ interactions with smartphones forces security tools to compete for users’ attention with primary tasks on smartphones, such as sending messages or browsing. In this poster, we present the design of the study that aims to address the aforementioned limitations of existing smartphone locking systems. In particular, we aim to design and evaluate a system that allows users to lock data items within applications and applications’ functionalities. We then present the study design that aims to evaluate the efficiency and the effectiveness of the proposed locking system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying Requirements of a Self-care System on Smartphones for Preventing Coronavirus Disease 2019 (COVID-19)

Background: Smartphone applications play a pivotal role in management, providing care and preventing infectious diseases. It also has the potential impact on supportive and self-care. This study aimed to identify the requirements for a smartphones self-care system to prevent corona-virus (COVID-19). Materials & Methods: This was a descriptive study performed in two main stages in 2020. At the ...

متن کامل

Ultra-Fine Grained Dual-Phase Steels

This paper provides an overview on obtaining low-carbon ultra-fine grained dual-phase steels through rapid intercritical annealing of cold-rolled sheet as improved materials for automotive applications. A laboratory processing route was designed that involves cold-rolling of a tempered martensite structure followed by a second tempering step to produce a fine grained aggregate of ferrite and ca...

متن کامل

An Evaluation of Coarse-Grained Locking for Multicore Microkernels

The trade-off between coarseand fine-grained locking is a well understood issue in operating systems. Coarse-grained locking provides lower overhead under low contention, finegrained locking provides higher scalability under contention, though at the expense of implementation complexity and reduced best-case performance. We revisit this trade-off in the context of microkernels and tightly-coupl...

متن کامل

Taming Information-Stealing Smartphone Applications (on Android)

Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal information. However, recent studies also reveal the disturbing fact that users’ personal information is put at risk by (rogue) smartphone applications. Existing solutions exhibit limitations in their capabilities in taming these privacy-violating smartphone applications. In ...

متن کامل

Who Sits Where? Infrastructure-Free In-Vehicle Cooperative Positioning via Smartphones

Seat-level positioning of a smartphone in a vehicle can provide a fine-grained context for many interesting in-vehicle applications, including driver distraction prevention, driving behavior estimation, in-vehicle services customization, etc. However, most of the existing work on in-vehicle positioning relies on special infrastructures, such as the stereo, cigarette lighter adapter or OBD (on-b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012