Using Screen Brightness to Improve Security in Mobile Social Network Access

被引:15
作者
Guerar, Meriem [1 ]
Migliardi, Mauro [2 ]
Merlo, Alessio [3 ]
Benmohammed, Mohamed [4 ]
Palmieri, Francesco [5 ]
Castiglione, Aniello [5 ]
机构
[1] Univ Sci & Technol Oran, Bir El Djir 31000, Algeria
[2] Univ Padua, I-35122 Padua, Italy
[3] Univ Genoa, I-16126 Genoa, Italy
[4] Univ Constantine, Constantine 25017, Algeria
[5] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
关键词
Smartphone; social networks; mobile-access; malware; authentication; usable security; brightness;
D O I
10.1109/TDSC.2016.2601603
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the today's mobile communications scenario, smartphones offer new capabilities to develop sophisticated applications that seem to make daily life easier and more convenient for users Such applications, which may involve mobile ticketing, identification, access control operations, etc., are often accessible through social network aggregators, that assume a fundamental role in the federated identity management space. While this makes modem smartphones very powerful devices, it also makes them very attractive targets for spyware injection. This kind of malware is able to bypass classic authentication measures and steal user credentials even when a secure element is used, and can, therefore perform unauthorized mobile access to social network services without the user's consent. Such an event allows stealing sensitive information or even a full identity theft. In this work, we address this issue by introducing BrightPass, a novel authentication mechanism based on screen brightness. BrightPass allows users to authenticate safely with a PIN-based confirmation in the presence of specific operations on sensitive data. We compare BrightPass with existing schemes, in order to show its usability and security within the social network arena. Furthermore, we empirically assess the security of BrightPass through experimentation. Our tests indicate that BrightPass protects the PIN code against automatic submissions carried out by malware while granting fast authentication phases and reduced error rates.
引用
收藏
页码:621 / 632
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2011, GLOBAL PLATFORMS WHI
[2]  
[Anonymous], 2011, 12 AUSTR US INT C
[3]  
[Anonymous], 1983, The Psychology of Human-Computer Interaction
[4]  
[Anonymous], 2011, HOTSEC
[5]  
[Anonymous], 2012, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
[6]  
[Anonymous], 2011, SIMALLIANCE WHITE PA
[7]  
[Anonymous], 2012, P SIGCHI C HUM FACT, DOI DOI 10.1145/2207676.2208414
[8]  
Aviv AJ, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P41
[9]  
Bernabeu G., 2014, WEB CRYPTOGRAPHY NEX, P10
[10]   A taxonomy-based model of security and privacy in online social networks [J].
Caviglione, L. ;
Coccoli, M. ;
Merlo, A. .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) :325-338