Decoupling data-at-rest encryption and smartphone locking with wearable devices

作者: Ildar Muslukhov , San-Tsai Sun , Primal Wijesekera , Yazan Boshmaf , Konstantin Beznosov

DOI: 10.1016/J.PMCJ.2016.06.016

关键词:

摘要: Abstract Smartphones store sensitive and confidential data, e.g., business related documents or emails. If a smartphone is stolen, such data are at risk of disclosure. To mitigate this risk, modern smartphones allow users to enable encryption, which uses locking password protect the encryption key. Unfortunately, either do not lock their devices all, due usability issues, use weak easy guess 4-digit PINs. This makes current approach protecting data-at-rest ineffective against guessing attackers. address problem we design, implement evaluate Sidekick system — that wearable device decouple locking. Evaluation revealed proposal can run on an 8-bit System-on-Chip, only 4 Kb/20 Kb RAM/ROM, allows key fetching in less than two seconds, while lasting for more year single coin-cell battery.

参考文章(20)
Quang Duy Pham, David P. Wilson, Cliff C. Kerr, Andrew J. Shattock, Hoa Mai Do, Anh Thuy Duong, Long Thanh Nguyen, Lei Zhang, Estimating the Cost-Effectiveness of HIV Prevention Programmes in Vietnam, 2006-2010: A Modelling Study. PLOS ONE. ,vol. 10, pp. 1- 14 ,(2015) , 10.1371/JOURNAL.PONE.0133171
Bruce Schneier, Tadayoshi Kohno, Niels Ferguson, Cryptography Engineering: Design Principles and Practical Applications ,(2010)
Mohammad Mannan, Adam Skillen, On Implementing Deniable Storage Encryption for Mobile Devices network and distributed system security symposium. ,(2013)
Carles Gomez, Joaquim Oller, Josep Paradells, Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology Sensors. ,vol. 12, pp. 11734- 11753 ,(2012) , 10.3390/S120911734
Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, Heinrich Hussmann, Touch me once and i know it's you! Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems - CHI '12. pp. 987- 996 ,(2012) , 10.1145/2207676.2208544
N. Saxena, J.-E. Ekberg, K. Kostiainen, N. Asokan, Secure device pairing based on a visual channel ieee symposium on security and privacy. pp. 306- 313 ,(2006) , 10.1109/SP.2006.35
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, Konstantin Beznosov, Know your enemy: the risk of unauthorized access in smartphones by insiders human computer interaction with mobile devices and services. pp. 271- 280 ,(2013) , 10.1145/2493190.2493223
Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: a touchscreen graphical password human computer interaction with mobile devices and services. pp. 251- 260 ,(2013) , 10.1145/2493190.2493213
Jonathan Zdziarski, Identifying back doors, attack points, and surveillance mechanisms in iOS devices Digital Investigation. ,vol. 11, pp. 3- 19 ,(2014) , 10.1016/J.DIIN.2014.01.001
Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A Gunter, Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23097