YoVDO

iLock - Immediate and Automatic Locking of Mobile Devices against Data Theft

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cybersecurity Courses Data Protection Courses Mobile Device Security Courses

Course Description

Overview

Explore a conference talk from CCS 2016 that introduces iLock, an innovative system for immediate and automatic locking of mobile devices to prevent data theft. Delve into the challenges of existing authentication methods and learn about the novel approach using active acoustic sensing for leaving detection. Discover the design goals, attacker models, and the implementation of Frequency Modulated Carrier Wave (FMCW)-based distance calculation. Examine user trace extraction techniques and the decision-making process for device locking. Analyze the system's performance in various scenarios, including one person leaving and landscape mode usage. Gain insights into the true positive rate, precision, and recall metrics when facing different types of attackers. Conclude with a power analysis of the iLock system and its potential impact on mobile device security.

Syllabus

Intro
Existing Authentication in Mobile Device
Automatic Locking
Leaving Detection by Active Acoustic Sensing
Challenges
Design Goals
Type-1 Attacker
Frequency Modulated Carrier Wave (FMCW)-based Distance Calculation
User Trace Extraction
When Should the Device be Locked?
One Person Leaving
Landscape Mode
Implementation
True Positive Rate VS. Orientation
Precision/Recall with a Type-III Attacker
Conclusion
Power Analysis


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube