SenSec: Mobile Security through Passive Sensing
|
|
|
- Jayson Wells
- 10 years ago
- Views:
Transcription
1 SenSec: Mobile Security through Passive Sensing Jiang Zhu, Pang Wu, Xiao Wang, Joy Zhang Department of Electrical and Computer Engineering Carnegie Mellon University Moffett Field, CA, USA {jiang.zhu, pang.wu, sean.wang, Abstract We introduce a new mobile system framework, SenSec, which uses passive sensory data to ensure the security of applications and data on mobile devices. SenSec constantly collects sensory data from accelerometers, gyroscopes and magnetometers and constructs the gesture model of how a user uses the device. SenSec calculates the sureness that the mobile device is being used by its owner. Based on the sureness score, mobile devices can dynamically request the user to provide active authentication (such as a strong password), or disable certain features of the mobile devices to protect user s privacy and information security. In this paper, we model such gesture patterns through a continuous n-gram language model using a set of features constructed from these sensors. We built mobile application prototype based on this model and use it to perform both user classification and user authentication experiments. User studies show that SenSec can achieve 75% accuracy in identifying the users and 71.3% accuracy in detecting the non-owners with only 13.1% false alarms. Index Terms mobile sensing, behavior recognition, user identification, passive authentication I. INTRODUCTION Reliable and convenient authentication is an essential requirement for a mobile device and its applications. Today, passwords are the most common form of authentication. This results in two potential problems. First, passwords are major sources of security vulnerabilities, as they are often easy to be guessed, re-used, often forgotten, often shared with others, and are susceptible to social engineering attacks. Secondly, to secure the data and applications on a mobile device, the mobile system would prompt user for authentication quite often and this results in serious usability issues. Protecting a user s privacy and ensuring the accountability of mobile applications in a seamless and non-intrusive ways poses great challenges to next generation mobile computing platforms. The commoditization of sensor technologies coupled with advances in modeling user behavior creates new opportunities for simplifying and strengthening mobile device security. We envision a new mobile system framework, SenSec, which uses passive sensory data to ensure mobile application security. SenSec collects data from accelerometer, gyroscope and other sensors and builds its owner s gesture model. Once the model is built, SenSec also continuously evaluates the sureness whether the mobile device is under the control of the owner. This information can be used subsequently by ondevice security sub-systems to control the access to resources, services and data as shown in Figure 1. A common use scenario of SenSec would like this: You are at a party and Fig. 1. SenSec Overview: A Motivating Example mistakenly leave your phone unattended. The phone is picked up by one of your friends. Out of curiosity, she starts to browse your applications and data. You certainly would not mind if she only plays a mobile game, but would feel extremely uncomfortable if she starts to view your contact list and uses your mobile banking apps. Because the gesture patterns are so different between you two, the SenSec system would detect this incident and automatically trigger further authentication, if any sensitive applications are invoked. In this paper, we propose a probabilistic approach to model user s gesture patterns using a generative continuos n-gram language model. We built a functional SenSec prototype, which keeps track of sensory reading from accelerometer, gyroscope and magnetometer on device, builds the context of user s gesture pattern and uses that to verify user s identity. We conducted two sets of user experiments using this prototype: 1) Offline User Identification. We asked users to use the same device to perform the same set of actions for several times (e.g., picking up the device from a table and starting to use a certain application) and collected the motion sensory data during these actions. We then performed user classification task to infer user s gender, occupation, age and its user ID. 2) Online Anomaly Detection. With the behavior model trained from one user s sensor data, we evaluated the effectiveness of SenSec by testing how well it can detect the incident that the phone is used by another user. Results from the offline experiments show that SenSec system achieves 75% accuracy in classifying users, while the results from the online experiments show that the system is able to successfully detect 71.3% cases when the phone is
2 operated by non-owner(anomalies) and only to trigger false alarms for 13.1% cases when it s still used by the owner. II. RELATED WORK Biometric authentication, which applies context-awareness [1], [19] to security applications, verifies user identity by leveraging the uniqueness of behavioral characteristics and/or physical trait. Traditional schemes include fingerprint scanners, iris recognition, voice recognition, face recognition and so forth. Since last decade, novel approaches have sprung out. Orr and Abowd [11] designed a system which can identify users based on their footstep force profiles. Work by Peacock et al. [12] concentrated on keystroke patterns and the underlying typing characteristics to perform user identification. Work by Davrondzhon et al. [6] proposed a scheme that uses accelerometers mounted on lower leg for gait recognition and uses it to enforce authentication. Other biometrics including blinking pattern, writing style, etc. were also explored in the past which focus on individuals behaviors. More recently, as sensing and computing capabilities become standard on smartphones, researchers have begun to collect more types of sensory data on devices to build user behavior models and use the model to infer certain contexts, including user authentication. In the work of Zheng et al. [20], the GPS readings are used to detect whether a person is walking, running, driving a car, or riding a bus. Schmidt et al. [13] monitors various system parameters on a mobile device, including system free memory, running process count, user inactivity, CPU usage and SMS count, for anomaly detection and IDS. Keng-hao et al. [8] predicts whether the user is interruptible based on the input from microphone and the user s keyboard activities by detecting the unique pattern of holding the television remote control using the accelerometers attached. Jakobsson et al. [9] put forward the notion of implicit authentication in that the authentication strategy is carried out based on what applications and features on a mobile phone are being used. Shi et al. [15] also devised an implicit authentication architecture in which a user model is constructed from a user s past behavior recorded by the mobile device. Then with this model and recently observed user activities, device can score the trustworthiness of current user and respond accordingly. SenGuard [16], a similar system to SenSec, leverages availability of multiple sensors on smartphones and passively use them as sources of user identification in background. It invokes active user authentication when there is a mounting evidence that the phone user has changed. Our work extends beyond the aforementioned efforts in that 1) Instead of using devices mounted to various part of the human body, we explored the possibility of using the sensory data collected from generic smart phones to model user s gesture patterns while users are using the devices. 2) Different from SenGard, which uses JigSaw engine [10] to detect 5 common physical activities, stationary, walking, cycling, running, and in a vehicle (i.e., car, bus), SenSec uses a novel and simple n-gram model to capture individual users Natural Language Behavior Language Example Word Atomic Movement Device tilt and movement Phrase Movement Picking up the phone Sentence Action Making a phone call Paragraph Activity Search for the nearest pizza place and place a phone order Document Event Prepare for a lunch meeting TABLE I BEHAVIOR AS LANGUAGE AT DIFFERENT LEVELS. motion gesture. 3) One of our experiments was based on the data collected from a group of users performing the same tasks with the device. This further verify that gesture patterns are very personal and can be used for user identification and classification. 4) We integrated our approach into a prototype system and tested it in participants the day-to-day usage. Our system can identify non-owner anomaly in less than 5 seconds, faster than existing work [9], which makes our approach practical for real deployments. III. MOBILE DEVICE GESTURE PATTERNS Modern mobile devices come with various mobile sensors, such as accelerometers, gyroscope, magnetometer, microphone, camera, GPS receiver, WiFi and Bluetooth receivers, etc. Combined, these sensors are able to sense the context of the mobile device such as the outdoor and indoor location, wireless environment, user s motion and gesture. In our study, we focus on the factors governed by motion and posture sensors, i.e. accelerometers, gyroscope, orientation sensors and magnetometers. These factors describe physical aspects of individuals. Many of the characteristics we explore here are highly related to biometrics, such as how a user retrieves the phone, how she holds it while using certain applications, how she types on the keyboard and press the buttons. A. A Language Approach on Behavior Modeling The similarity between human behavior and language had been articulated by Burke [2] and Wertsh [18]. They are both mediational means or tools by which we achieve our ends. They exhibit structure and satisfy grammars. Table I illustrates that ambulatory behavior share a lot in common with natural languages at all levels. Atomic movements form the vocabulary of the behavior language. A sequence of atomic movements performed in meaningful order creates a movement such as an action of picking up the device. Actions such as making a phone call are created by performing actions in a right order similar to create a sentence. A sequence of actions builds up an activity. Higher level behavioral concept event is composed of a series of activities in a similar way as a document. Shannon in [14] established that a language could be approximated by an n-th order Markov model (n-gram). Using an n-gram model trained on the English text, we can estimate whether United or house is more likely to follow the phrase the president of the by comparing the probability P ( United the president of the ) and P ( house the president of the ). Such an n-gram model has also been proven to be very robust in modeling sequences of data other than
3 Sensing Feature Construction Preprocessing Threshold Behavior Text Generation N-gram Model Classifier Binary Classifier Inference Modeling User Classification User Authentication Fig. 2. SecSec: modeling motion and posture patterns using a language approach language. Similar to [3] [5], [21], in our work, we adopt a scheme by converting real-valued sensor readings to symbols through quantization, vectorization or clustering and using n- gram models to capture the patterns in a user s motion gesture. In SenSec framework, as shown in Figure 2, we convert the raw sensory data into behavior text representation as sequences of behavior labels. Each behavior label is considered as a word in the language. We then train a continuos n-gram language model on those traces and use the trained model for user identification and anomaly detection. 1) Behavior Text Representation: Data produced by motion sensors usually are multi-dimensional and real-valued. This may prevent us from using them directly in our language approach due to computation complexity. To convert the sensory readings into behavior text, we first segment the raw sensor readings into a series of chucks of fixed size in time. For each chunk, we then construct a set of features and build feature vector for that time slot. After that, these feature vectors are clustered into V classes using K-means algorithm. The centroids of the resulting V classes form the vocabulary V. Thus, the sequence of feature vectors can be mapped to a series of class labels {l 0, l 1, l 2,..., l n,... }, where l i V. This forms the behavior labels for the n-gram processing. 2) Continous n-gram Model: An n-gram model is a n- order Markov model for predicting the next item in a sequence. The two core advantages of n-gram models are 1) relative simplicity and 2) the ability to scale up. Moreover, n-gram model is a generative model. Compared with discriminative models such as SVM, it also enables us to perform user authentication task with only positive training samples collected from the owner. In our context, the n-gram model estimates the probability of the next behavior label l i given the previous n 1 behavior labels from the traces denoted as in Equation 4. P (l i l i 1 i n+1 ) = P (l i l i n+1, l i n+2,..., l i 1 ) (1) The model probabilities P (l i l i 1 i n+1 ) can be estimated through the Maximum Likelihood Estimation (MLE) from the training data by counting the occurrences of behavioral text labels: P MLE (l i l i 1 i n+1 ) = C(l i n+1,..., l i 1, l i ) C(l i n+1,..., l i 1 ) (2) B. User Classification We can build n-gram models for M different users or user groups (or classes). Without losing generality, let s denote V as the vocabulary and G as the set of all n-grams from such a behavioral text data set, then the models of these M classes can be described as probability vectors as P 0, P 1, P 2,..., P M 1 where P m = {P m (l i l i 1 i n+1 ) (3) l i V, l i 1 i n+1 G} For a sequence of behavioral labels of size N, L = {l 1, l 2,..., l N }, we estimate the probability that L is generated by a given n-gram model P m as P (L, m) = P (l 1, l 2,..., l N, m) = N P m (l i l i 1 i n+1 ) (4) or average log probability as 1 log P m (l i l i 1 i n+1 N ) (5) where P m (... ) are the model probabilities of user m as in Equation 3. Given a behavior text sequence L, the use classification problem can be formulated as û = arg max P (L, m) (6) m where P (L, m) is the probability the behavior text sequence L is generated by mth user s n-gram model as denoted in Equation 4. Therefore, 1 û = arg max log P m (l i l i 1 i n+1 m N ) (7) = arg max m C. User Authentication log P m (l i l i 1 i n+1 ) (8) User authentication problem can be formulated as binary classification problem, classifying a user as the owner (â = 1) or not (â = 1). We can model this scheme probabilistically as shown in Equation 9: given an observation r, evaluate the probability of a given user is the owner (â = 1) and check to see if it exceeds a certain threshold θ. â = sign[p (u = 1 r) > θ] (9) Specifically, given a sequence of behavior text L, and a sensitivity threshold θ, we want to validate if these sequence is generated by user m as â(l m, θ) = sign[p (L, m) > θ)] (10) while P (L, m) = P (l 1, l 2,..., l N, m) = N P m(l i l i 1 i n+1 ) as in Equation 4: â(l m, θ) = sign( log P m (l i l i 1 i n+1 ) > log θ)
4 Fig. 3. Distributions of demographic groups for user classification IV. EXPERIMENTS SenSec enables us to model user s gesture patterns and use it to do user classification and user authentication. For our next step, we want to investigate how effective and feasible this framework might be in practice. In our first experiment, we investigated SenSec s effectiveness in conducting user identification. The goal is to evaluate how well we can distinguish users by their gesture patterns when they are performing the same tasks. In our second experiment, we put the SenSec framework in a real world scenario where the SenSec Application is performing user authentication on the device while users are using it. A. Offline User Classification 20 volunteers 1 from different demographic groups (genders, occupations, and age) participated in the study. The distribution of their demographics are shown in Figure 3. All participants were given the same Google Nexus S smartphone loaded with our sensing application and were asked to perform the same task for 5-10 times. Specifically, they were asked to perform the following tasks in a sequential order: 1) Pick up the device from a desk 2) Unlock the device using the right slide pattern 2 3) Invoke app from the Home Screen 4) Lock the device by pressing the Power button 5) Put the device back on the desk Traces for each experiment were matched with the participant s class labels and were sent to the server for offline modeling and classification. In this section, we first describe our data collection and preprocessing methods and then we present the results from offline user classifications. 1) Data Collection and Preprocessing Method: During the experiments, our sensing application monitors the accelerometers, orientations, gyroscopes and magnetometers. We set the sample rate of these sensors at 4Hz, i.e. the application produces 4 samples per second and each sample contains 12 real valued readings, including Accelerometer (X, Y, Z), Orientation (Azimuth, Pitch, Roll), Compass (X, Y, Z), and Gyroscope (X, Y, Z). Each experiment lasts about seconds, which produces about 1250 time-stamped samples. 1 User studies were conducted with the approval of IRB application HS11-094, Human Behavioral modeling using Mobile Sensors from the IRB Board at Carnegie Mellon University. 2 No password or lock patterns are configured on the phone Classification Target No. of Classes Accuracy Gender Age Group Occupation User ID TABLE II EXPERIMENT RESULTS FOR USER CLASSIFICATIONS These samples are then uploaded to our server and labeled with the hashed user ID to hide participant s real identity. During offline preprocessing phase, we adopt a sliding window approach in constructing the features. We chose the window size of 2 second and stepping offset of 500 ms. Using the data in the window, each feature vector is composed by various statistical features [7], including Root Mean-Square, Root Mean-Square error, minimum value, maximum value, average sample-by-sample change, number of local peaks, number of local crests and combined signal magnitude, etc., to capture sufficient statistics of those micro movements. 2) Training and Testing: These motion feature vectors are clustered in V classes using K-means clustering algorithm. The centroids of the resulting V Classes are mapped to behavior text labels and become the dictionary of the model. For a given classification tasks to predict participant s gender, occupation, age group and user ID, we randomly reserve 20% of the samples from each class as testing set {E} and use the rest as training set {R} to train a N order n-gram model for that class. For each sample L from {E}, we calculate P (L, m) for the models of all the classes where m = 1, 2,..., M and select m with the maximum P (L, m) as the class label prediction. We chose V = 200 and N = 5 due to performance and complexity trade-offs. 3) Results: We repeated above experiments for 5 times, which is equivalent to a 5-folder cross validation (CV). The results are shown in Table II. By using the data from a small group of participants, we can achieve a reasonable accuracy in classifying users of different classes. We also found that most of the misclassifications happened when the experiments were conducted back-to-back. There were chances that the latter participants may have observed previous participants motion and posture and subconsciously tried to mimic what he or she have done [17]. We could re-evaluate our approach by conducting experiments in an isolated environment and with a large number of participants. B. Online User Authentication We integrated the aforementioned data preprocessing and modeling schemes into the sensing application and add a user authentication logic with a behavior-based authentication GUI. This resulted a new SenSec App as shown in Figure 4. We loaded this application to a smartphone and gave it to a group of participants to conduct the online user authentication experiments. 3 1) Training and Testing: These experiments were carried out by the following settings: 1) Training Stage: Each of the participants uses the phone for 24 hours while the SenSec app is collecting sensory 3 Youtube Video:
5 1 0.9 Threshold: True Positive Rate Experiment I Experiment II Average Fig. 4. The SenSec mobile application, from left to right: 1) Interface to select applications to be protected by SenSec. 2) SenSec control panel: start training and set the sensitivity threshold. 3) When an application is invoked while an anomaly is also detected (sureness score is low), a password screen is pop up for user authentication. information in the background and build the behavioral n-gram model. 2) Positive Testing Stage: In this stage, each participants continue uses her phone for 24 hours. This time the SenSec app is switched to testing mode. It collects the sensors reading the same way as in training mode, but also construct behavior text sequence and feed it to the learned n-gram model. A sureness score is calculated as described in Equation 4. If it falls below a preset threshold while certain operation is performed, an authentication screen will be pop up asking user to enter a passcode. The sureness score and the authentication decision are recorded for logging and result reporting purpose. 3) Negative Testing Stage: The phones are given to other participants and let them use it for another 24 hours. As in the previous stage, the same operations are performed on the phone and all authentication events will be record for further analysis. 2) Results: We examined the logs generated by these experiments. At each authentication decision point, the sureness score is recorded. By varying the threshold, we can evaluate how well our SenSec models perform user authentication under different threshold values. For each threshold value, we can calculate False Positive Rate or FPR and True Positive Rate or TPR and plot Receiver Operating Characteristic (ROC) curves. Figure 5 shows ROC curves for user authentication experiments. Each points on the ROC curve corresponds to a certain threshold. The upper left corner represents perfect authentication, while diagonal represents the model that is performing no better than a coin-flip. True Positive Rate (TPR) represents the cases that system successfully detect non-owner access, while False Positive Rate (FPR) represents the false alarms when the owner is detected as a non-owner. To ensure the security of the system while still keeping the usability to a certain level, we need to maximize TPR and minimize FPR. The ROC curves provide a guideline on choosing the right thresholds to fulfill such a requirement. For example, the system may have a requirement to effectively detect 70% of the unauthorized access, but it False Positive Rate Fig. 5. Receiver Operating Characteristic (ROC) curves of the n-gram model for training size of 4 and 12 hours. may need to keep the false alarm rate below 15%. As shown in Figure 5, we can choose a data point from the allowable region on the ROC curve: threshold 0.7 can achieve 71.3% TPR and only 13.1% FPR. We also examined the detection delay at this threshold by deliberately passing the phone between the two users more often and recording the time. By comparing these recorded time and the timestamps of triggered anomalies from the log, we found SenSec bears an average 4.96 seconds detection delay. V. DISCUSSIONS AND FUTURE WORK In the first experiment, we were able to classify users into different pre-defined categories by monitoring the motion and posture when they perform a given task using their smart phones. The level of accuracy shows that a small segment of user s gesture trace collected from the mobile device is able to capture the physical characteristic of the person. On one hand, these results show promising potentials of mobile sensing in various applications with high level of personalization: it enables the mobile application developers and mobile service providers to know more about the users. Thus, they can provide more customized services and assistances to the users. This indeed would improve the usability of the mobile devices. However, on the other hand, such capability may also reveal security vulnerability and raise privacy concerns, since it may allow the 3rd parties obtain too much personal information. Moreover, since the mobile sensing is usually a background or passive task, it may not raise enough user awareness so that they can take actions to protect their privacy and their data security. It is our belief that novel approaches to balance these two trade-offs would be of great research value. We have made the android app available to a small group of trial users and we are planning on a large scale study to further validate our hypothesis and improve our model in the presence of large data sets. The second experiment served as an early trial of a personalized application mentioned above in a security context. While it is able to detect majority of the non-owner cases, the false alarms also decreased the usability dramatically. Even though
6 the overall FPR of our system is only 13.1%, participants in our experiments still complained that the system had triggered the false alarms too often. In one particular case, a participant was trying to answer a call while driving and the system triggered the passcode authentication multiple times to protect the dialer application. This is not only an annoyance, but also a safety hazard. To mitigate such a problem, we are planning to add other contexts along side with the motion and posture sensing to determine if further authentication is needed. The added context may be able to provide a more accurate results. Additionally, we observed that different applications on a mobile device may have different sensitivities (i.e. threshold) towards the threats and data loss. We are investigating an adaptive scheme to determine the thresholds for different applications based on applications profile and user s usage patterns. VI. CONCLUSION In this paper, we propose a probabilistic approach to model user s gesture patterns using continuous n-gram language model. We built a functional prototype SenSec, which keeps track of sensory reading from accelerometer, gyroscope and magnetometer on device, builds the context of user s gesture patterns and use them to perform user classification or to identify whether it is the owner. The results showed that SenSec system achieves 75% accuracy in user classification tasks and 71.3% accuracy in user authentication tasks with only 13.1% false alarms and 4.96 detection delay. The experiment results demonstrated that using sensory data collected from the mobile devices, we can model user s motion and posture patterns when they use the devices. Using these models, we can infer user s identity or category. This approach may not only enable more sensing-based personalization application and services, but also introduce privacy risks and security concerns, because such a passive sensing may reveal too much information about the user without the proper consent or permission from them. The potential benefits and risks and their trade-offs deserve further and deeper investigations. VII. ACKNOWLEDGMENTS This research was supported in part by the CyLab Mobility Research Center at Carnegie Mellon under grants DAAD and W911NF from the Army Research Office and by the Cisco Research Award. The authors would also like to thank Professor Patrick Tague at Carnegie Mellon University and Dr. Yue Chuan She at Facebook Inc. for their valuable comments and suggestions. [4] P.-W. Chen, S. K. Chennuru, and Y. Zhang. A language approach to modeling human behavior. In Proceedings of The seventh international conference on Language Resources and Evaluation (LREC), Valletta, Malta, May [5] K. Farrahi and D. Gatica-Perez. Extracting mobile behavioral patterns with the distant n-gram topic model. Wearable Computers, IEEE International Symposium, 0:1 8, [6] D. Gafurov, K. Helkala, and T. Sondrol. Biometric gait authentication using accelerometer sensor. Journal of Computers, 1, [7] J. Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In COM- SNETS, pages 1 9, [8] K. hao Chang, J. Hightower, and B. Kveton. Inferring identity using accelerometers in television remote controls. In In Proceedings of the International Conference on Pervasive Computing, [9] M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX conference on Hot topics in security, HotSec 09, pages 9 9, Berkeley, CA, USA, USENIX Association. [10] H. Lu, J. Yang, Z. Liu, N. D. Lane, T. Choudhury, and A. T. Campbell. The jigsaw continuous sensing engine for mobile phone applications. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, SenSys 10, pages 71 84, New York, NY, USA, ACM. [11] R. Orr and G. Abowd. The smart floor: A mechanism for natural user identification and tracking. ACM Press, [12] A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: a key to user identification. Security Privacy, IEEE, 2(5):40 47, sept.-oct [13] A.-D. Schmidt, F. Peters, F. Lamour, and S. Albayrak. Monitoring smartphones for anomaly detection. In Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 08, pages 40:1 40:6, ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social- Informatics and Telecommunications Engineering). [14] C. E. Shannon. A mathematical theory of communications. Bell Sys. Tech. Journal, 27: , , [15] E. Shi, Y. Niu, M. Jakobsson, and R. Chow. Implicit authentication through learning user behavior. In Proceedings of the 13th international conference on Information security, ISC 10, pages , Berlin, Heidelberg, Springer-Verlag. [16] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong. Senguard: Passive user identification on smartphones using multiple sensors. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on, pages , oct [17] L. Van Boven, A. Kamada, and T. Gilovich. The perceiver as perceived: Everyday intuitions about the correspondence bias. Journal of Personality and Social Psychology, 77(6): , [18] J. V. Wertsch. Mind As Action. Oxford University Press, USA, [19] K. Wrona and L. Gomez. Context-aware security and secure contextawareness in ubiquitous computing environments. [20] Y. Zheng, Q. Li, Y. Chen, X. Xie, and W.-Y. Ma. Understanding mobility based on gps data. In Proceedings of the 10th international conference on Ubiquitous computing, UbiComp 08, pages , New York, NY, USA, ACM. [21] J. Zhu and Y. Zhang. Towards accountable mobility model: A language approach on user behavior modeling in office wifi networks. In Proceedings of The IEEE International Conference on Computer Communications and Networks (ICCCN 2011), Maui, Hawaii, July 31 - August REFERENCES [1] M. Baldauf and S. Dustdar. A survey on context-aware systems. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COM- PUTING, page 2004, [2] K. Burke. Language as Symbolic Action. University of California Press, [3] S. Buthpitiya, Y. Zhang, A. Dey, and M. Griss. n-gram geo-trace modeling. In Proceedings of Ninth International Conference on Pervasive Computing, San Francisco, CA, June
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!
SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact
Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock
Progressive Authentication on Mobile Devices Zachary Fritchen Introduction Standard authentication schemes on mobile phones are at the moment very limited. They are typically restricted to a single security
Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
An Analysis of the Transitions between Mobile Application Usages based on Markov Chains
An Analysis of the Transitions between Mobile Application Usages based on Markov Chains Charles Gouin-Vallerand LICEF Research Center, Télé- Université du Québec 5800 St-Denis Boul. Montreal, QC H2S 3L5
People centric sensing Leveraging mobile technologies to infer human activities. Applications. History of Sensing Platforms
People centric sensing People centric sensing Leveraging mobile technologies to infer human activities People centric sensing will help [ ] by enabling a different way to sense, learn, visualize, and share
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Home Monitoring and Control service provided by Verizon Online LLC
Home Monitoring and Control service provided by Verizon Online LLC A separate subscription to Verizon FiOS TV is required for use with FiOS TV service. About This Manual This manual is designed for online
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
A Comparative Evaluation of Implicit Authentication Schemes
A Comparative Evaluation of Implicit Authentication Schemes Hassan Khan, Aaron Atwater, and Urs Hengartner Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada {h37khan,aatwater,urs.hengartner}@uwaterloo.ca
Usable Multi-Factor Authentication and Risk- Based Authorization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Usable Multi-Factor Authentication and Risk- Based Authorization IBM T.J. Watson Research Center Larry Koved December 18, 2014 Team Profile
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: [email protected] Fax: +49
Usable Multi-Factor Authentication and Risk-Based Authorization
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Usable Multi-Factor Authentication and Risk-Based Authorization IBM T. J. Watson Research Center Larry Koved, Research Staff Member 17 September 2013
THE Internet is a powerful tool used in all kinds of the
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1343 1348 DOI: 10.15439/2015F161 ACSIS, Vol. 5 Selected methods of artificial intelligence for Internet of Things
A wireless sensor network for traffic surveillance
A wireless sensor network for traffic surveillance Sing Yiu Cheung, Sinem Coleri, Ram Rajagopal, Pravin Varaiya University of California, Berkeley Outline Traffic measurement Wireless Sensor Networks Vehicle
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
SmartCart Design Description
SmartCart Design Description Version 1.0 Revision History Date Version Description Author 2011-10-20 0.1 Initial draft SmartCart Team 2011-24-10 0.8 Revised draft SmartCartTeam 2011-27-10 0.9 Revised draft
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Multi-sensor authentication to improve smartphone security
Multi-sensor authentication to improve smartphone security Wei-Han Lee, Ruby B. Lee Princeton Architecture Lab for Multimedia and Security (PALMS) Department of Electrical Engineering, Princeton University,
SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG
Technical Disclosure Commons Defensive Publications Series January 06, 2016 SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG Alexander Faaborg Ariel Sachter-Zeltzer Follow this and additional
Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm
Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm Choon Kiat Lee 1, Vwen Yen Lee 2 1 Hwa Chong Institution, Singapore [email protected] 2 Institute
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
A Survey of Existing Technologies, Applications, Products, and Services for Geofencing
Report to the US Department of Transportation Research and Innovative Technology Administration A Survey of Existing Technologies, Applications, Products, and Services for Geofencing California PATH Program
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones
An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones German Castignani, Raphaël Frank, Thomas Engel Interdisciplinary Centre for Security Reliability and Trust (SnT) University of
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
How to Use Motion Detection in ACTi Cameras
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Application Model: All Firmware: N/A Software: N/A Author: Ando.Meritee Published: 2010/11/19 Reviewed: 2011/03/02 How to Use
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2
A smartphone based real-time daily activity monitoring system. Shumei Zhang Paul McCullagh Jing Zhang Tiezhong Yu
A smartphone based real-time daily activity monitoring system Shumei Zhang Paul McCullagh Jing Zhang Tiezhong Yu Outline Contribution Background Methodology Experiments Contribution This paper proposes
Beating the NCAA Football Point Spread
Beating the NCAA Football Point Spread Brian Liu Mathematical & Computational Sciences Stanford University Patrick Lai Computer Science Department Stanford University December 10, 2010 1 Introduction Over
Ultra Dashcam. with Smartphone app control INSTRUCTION MANUAL
Ultra Dashcam with Smartphone app control EN INSTRUCTION MANUAL 1 Getting to know the Dashcam GPS Receiver Slot 1 Camera Lens Micro HDMI Port 2 Speaker 1 For future application 2 Requires Micro HDMI to
BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...
Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
BroadTouch Business Communicator
BroadTouch Business Communicator Admin Guide Release 10.0.1 Document Version 1.0 Table of Contents 1 Summary of Changes...1 1.1 Changes for Release 10.0.1 Document Version 1... 1 2 About BroadTouch Business
Modeling the Mobile Application Development Lifecycle
, March 12-14, 2014, Hong Kong Modeling the Mobile Application Development Lifecycle Tejas Vithani, Member, IAENG and Anand Kumar Abstract Software Development Lifecycle is crucial in Desktop or web application
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. [email protected]
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
Human Activities Recognition in Android Smartphone Using Support Vector Machine
2016 7th International Conference on Intelligent Systems, Modelling and Simulation Human Activities Recognition in Android Smartphone Using Support Vector Machine Duc Ngoc Tran Computer Engineer Faculty
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
WorkTime UC Mobile Admin Guide
WorkTime UC Mobile Admin Guide Release: 20.1.1 Android 20.1.2 ios Document Version 1.0 Table of Contents 1 About XO Hosted PBX UC Mobile Client...1 2 Use Cases...2 2.1 Placing Outbound Calls... 2 2.2 Receiving
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
CcMS: A Cloud Computing Based Content Management System
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 4 (2013), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm CcMS:
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
Using Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
The preliminary design of a wearable computer for supporting Construction Progress Monitoring
The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Passive Authentication and Active Factors
CASA: A Framework for Context-Aware Scalable Authentication Eiji Hayashi 1 Sauvik Das 1 Shahriyar Amini 1 Emmanuel Owusu 1 Jun Han 1 Jason Hong 1 Ian Oakley 2 Adrian Perrig 1 Joy Zhang 3 1 Carnegie Mellon
Architecture of a Platform for Building Context-Aware Educational Mobile Services
Architecture of a Platform for Building Context-Aware Educational Mobile Services ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] MAXIM MASLOV [email protected] Abstract:
