Abstract—People increasingly rely on mobile phones for stor-ing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk—once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is hard to defend by purely local means. We introduce the concept of ‘notarization’, a process by which a remote notary verifies the identity of the device user through video chat. We describe the design and implementation of a system that leverages notarization to protect cryptographic keys that the device uses to decrypt device data (e.g., website passwords) or perform signatures in support of clien...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...
abstract: Mobile devices have penetrated into every aspect of modern world. For one thing, they are ...
Abstract—People increasingly rely on mobile phones for stor-ing sensitive information and credential...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Keylogging and phishing attacks can extract user identity and sensitive account information for unau...
Thesis (Ph.D.)--University of Washington, 2015Mobile phones pervade virtually every realm of societa...
An unlocked mobile device can be a treasure trove of private information. Adversaries that are socia...
User authentication, the process of verifying the identity of a person who connects to important mob...
Mobile phones have almost replaced the work of traditional computers and people nowadays use them fo...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
Abstract: Cell phones are assuming an increasing role in personal computing tasks, but cell phone se...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...
abstract: Mobile devices have penetrated into every aspect of modern world. For one thing, they are ...
Abstract—People increasingly rely on mobile phones for stor-ing sensitive information and credential...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Keylogging and phishing attacks can extract user identity and sensitive account information for unau...
Thesis (Ph.D.)--University of Washington, 2015Mobile phones pervade virtually every realm of societa...
An unlocked mobile device can be a treasure trove of private information. Adversaries that are socia...
User authentication, the process of verifying the identity of a person who connects to important mob...
Mobile phones have almost replaced the work of traditional computers and people nowadays use them fo...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
Abstract: Cell phones are assuming an increasing role in personal computing tasks, but cell phone se...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmwa...
abstract: Mobile devices have penetrated into every aspect of modern world. For one thing, they are ...