首页> 外文学位 >Context-enhanced mobile device authorization and authentication.
【24h】

Context-enhanced mobile device authorization and authentication.

机译:上下文增强的移动设备授权和身份验证。

获取原文
获取原文并翻译 | 示例

摘要

Mobile devices (e.g., smartphones and tablets) are pervasive today, continuously opening up immense opportunities for everyday users. Their burgeoning popularity, however, brings forth various security and privacy threats. One well-established threat is of mobile malware (a form of insider attack) - malicious apps that may surreptitiously misuse the sensitive resources and services available on the device. Other threats relate to unauthorized access of the device (outsider attacks) by a malicious entity in close physical proximity to the device, or having (temporary or permanent) physical possession of the device. The traditional defensive mechanisms, such as existing anti-virus software, distance-bounding protocols or passwords, are not sufficient to defeat these threats.;This dissertation work explores the notion of "context"---a potentially unique signature of a benign usage scenario---to address insider-outsider attacks against mobile devices without undermining the overall usability of these devices. Our proposed defense system automatically detects the presence of a valid context using the information acquired by device's many on-board sensors; the absence of such a context being indicative of malicious usage. Depending upon the application scenario, we elicit the context provided, explicitly or transparently, by the device user (e.g., a hand gesture or body movement), or captured from the device's ambient environmental attributes (e.g., audio, temperature or altitude). When applicable, we use machine learning techniques and sensor fusion approaches towards designing a highly robust contextual mobile security system.;To be specific, this dissertation work comprises four parts: (1) enhancing mobile app authorization using implicit/explicit context, (2) enhancing user authentication using transparent implicit context, (3) enhancing co-presence detection using environmental context, and (4) strengthening the contextual security adversarial models and evaluating the context detection systems against such strong models.;In the first part, we present the design, implementation and evaluation of our contextual security mechanisms to defeat mobile malware attacks against prominent phone resources/services, namely, phone calls, camera and NFC payments. We use explicit as well as implicit context to detect user-friendly explicit gestures or transparent gesture so as to ascertain if the app requesting the permission to a sensitive resource is legitimate (and not malicious). In the second part, we present the design, implementation and evaluation of schemes to authenticate users transparently in the case of mobile (NFC) payments and zero-interaction authentication systems. In the third part, we present the design, implementation and evaluation of our co-presence detection system using different environmental context to thwart outsider "relay attacks" against mobile zero-interaction authentication systems and mobile payment systems. In the fourth part, we stretch the limits of the contextual security threat model to incorporate adversaries who may be capable of actively manipulating the context or underlying sensor data (internally or externally). Further, we present our insights to defend against such strong adversaries.
机译:如今,移动设备(例如智能手机和平板电脑)无处不在,并为日常用户不断打开了巨大的商机。但是,它们的迅速普及带来了各种安全和隐私威胁。一个公认的威胁是移动恶意软件(内部攻击的一种形式)-恶意应用可能会秘密滥用设备上可用的敏感资源和服务。其他威胁涉及与物理上非常接近或具有(临时或永久)物理拥有设备的恶意实体对设备的未授权访问(外部攻击)。传统的防御机制(例如现有的防病毒软件,有距离限制的协议或密码)不足以克服这些威胁。;本论文的工作探讨了“上下文”的概念-一种良性用法的潜在唯一签名方案-解决针对移动设备的内部-外部攻击而不破坏这些设备的整体可用性。我们建议的防御系统使用设备的许多车载传感器获取的信息自动检测有效上下文的存在;没有这样的上下文表示恶意使用。根据应用场景,我们得出由设备用户显式或透明提供的上下文(例如手势或身体移动),或从设备的周围环境属性(例如音频,温度或海拔高度)捕获的上下文。在适用的情况下,我们使用机器学习技术和传感器融合方法来设计高度健壮的上下文移动安全系统。具体而言,本文包括四个部分:(1)使用隐式/显式上下文增强移动应用授权,(2)使用透明隐式上下文增强用户身份验证,(3)使用环境上下文增强共存检测,以及(4)增强上下文安全对抗模型,并针对这种强大的模型评估上下文检测系统。设计,实施和评估我们的上下文安全机制,以克服针对主要电话资源/服务(即电话,相机和NFC付款)的移动恶意软件攻击。我们使用显式和隐式上下文来检测用户友好的显式手势或透明手势,从而确定请求对敏感资源进行许可的应用程序是否合法(而非恶意)。在第二部分中,我们介绍了在移动(NFC)支付和零交互身份验证系统情况下透明验证用户身份的方案的设计,实现和评估。在第三部分中,我们介绍了使用不同环境上下文来阻止针对移动零交互身份验证系统和移动支付系统的局外人“中继攻击”的共存检测系统的设计,实施和评估。在第四部分中,我们扩展了上下文安全威胁模型的范围,以合并可能主动(在内部或外部)操纵上下文或基础传感器数据的对手。此外,我们提出了自己的见解来防御这种强大的对手。

著录项

  • 作者

    Shrestha, Babins.;

  • 作者单位

    The University of Alabama at Birmingham.;

  • 授予单位 The University of Alabama at Birmingham.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 185 p.
  • 总页数 185
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号