iLock - Immediate and Automatic Locking of Mobile Devices against Data Theft
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a conference talk from CCS 2016 that introduces iLock, an innovative system for immediate and automatic locking of mobile devices to prevent data theft. Delve into the challenges of existing authentication methods and learn about the novel approach using active acoustic sensing for leaving detection. Discover the design goals, attacker models, and the implementation of Frequency Modulated Carrier Wave (FMCW)-based distance calculation. Examine user trace extraction techniques and the decision-making process for device locking. Analyze the system's performance in various scenarios, including one person leaving and landscape mode usage. Gain insights into the true positive rate, precision, and recall metrics when facing different types of attackers. Conclude with a power analysis of the iLock system and its potential impact on mobile device security.
Syllabus
Intro
Existing Authentication in Mobile Device
Automatic Locking
Leaving Detection by Active Acoustic Sensing
Challenges
Design Goals
Type-1 Attacker
Frequency Modulated Carrier Wave (FMCW)-based Distance Calculation
User Trace Extraction
When Should the Device be Locked?
One Person Leaving
Landscape Mode
Implementation
True Positive Rate VS. Orientation
Precision/Recall with a Type-III Attacker
Conclusion
Power Analysis
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube