首页> 外文学位 >Designing Effective Security and Privacy Schemes for Wireless Mobile Devices
【24h】

Designing Effective Security and Privacy Schemes for Wireless Mobile Devices

机译:为无线移动设备设计有效的安全和隐私方案

获取原文
获取原文并翻译 | 示例

摘要

The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs.;For smartphone security, we investigate the mobile phishing attacks, mobile clickjacking attacks and mobile camera-based attacks. Phishing attacks aim to steal private information such as credentials. We propose a novel anti-phishing scheme MobiFish, which can detect both phishing webpages and phishing applications (apps). The key idea is to check the consistency between the claimed identity and the actual identity of a webpage/app. The claimed identity can be extracted from the screenshot of login user interface (UI) using the optical character recognition (OCR) technique, while the actual identity is indicated by the secondary-level domain name of the Uniform Resource Locator (URL) to which the credentials are submitted. Clickjacking attacks intend to hijack user inputs and re-route them to other UIs that are not supposed to receive them. To defend such attacks, a lightweight and independent detection service is integrated into the Android operating system. Our solution requires no user or app developer effort, and is compatible with existing commercial apps. Camera-based attacks on smartphone can secretly capture photos or videos without the phone user's knowledge. One advanced attack we discovered records the user's eye movements when entering passwords. We found that it is possible to recover simple passwords from the video containing user eye movements.;Next, we propose an out-of-band two-factor authentication scheme for indoor IoT devices (e.g., smart appliances) based on the Blockchain infrastructure. Since smart home environment consists of multiple IoT devices that may share their sensed data to better serve the user, when one IoT device is being accessed, our design utilizes another device to conduct a secondary authentication over an out-of-band channel (light, acoustic, etc.), to detect if the access requestor is a malicious external device.;Unlike smartphones and IoT devices, IMDs have the most limited computation and battery resources. We devise a novel smartphone-assisted access control scheme in which the patient's smartphone is used to delegate the heavy computations for authentication and authorization. The communications between the smartphone and the IMD programmer are conducted through an audio cable, which can resist the wireless eavesdropping and other active attacks.
机译:现代无线和移动电子设备的日益普及为我们的日常生活带来了更多的便利和乐趣。当今的智能手机配备了各种传感器和无线通信技术,不仅可以支持电话和Web浏览等基本功能,而且还可以支持移动支付,生物识别安全性,健身监控等高级功能。 (IoT)是联网的流行无线设备的另一类,可以收集和交换数据。例如,越来越多地将智能设备部署为在家庭和办公室环境中使用,例如智能恒温器,智能灯泡和智能电表。此外,可植入医疗设备(IMD)是现代无线设备的典型类型,可植入人体内部以进行诊断,监视和治疗。但是,由于计算能力,电池容量等方面的固有局限性,与传统的个人计算机(PC)相比,这些现代的无线和移动设备没有得到很好的保护。在本文中,我们首先介绍发现的安全和隐私漏洞。然后,我们提出解决这些问题的设计,并增强智能手机,IoT设备和IMD的安全性。对于智能手机的安全性,我们研究了移动网络钓鱼攻击,移动点击劫持攻击和基于移动相机的攻击。网络钓鱼攻击旨在窃取凭据等私人信息。我们提出了一种新颖的反网络钓鱼方案MobiFish,该方案可以同时检测网络钓鱼网页和网络钓鱼应用程序(应用程序)。关键思想是检查所声明的身份与网页/应用程序的实际身份之间的一致性。可以使用光学字符识别(OCR)技术从登录用户界面(UI)的屏幕截图中提取要求保护的身份,而实际身份由统一资源定位器(URL)的二级域名表示,凭据已提交。点击劫持攻击旨在劫持用户输入,并将其重新路由到其他不应接收的用户界面。为了防御此类攻击,Android操作系统中集成了轻量且独立的检测服务。我们的解决方案不需要用户或应用程序开发人员的努力,并且与现有的商业应用程序兼容。在智能手机上基于相机的攻击可以在手机用户不知情的情况下秘密捕获照片或视频。我们发现的一种高级攻击可以记录输入密码时用户的眼睛运动。我们发现可以从包含用户眼动的视频中恢复简单密码。;接下来,我们提出了一种基于区块链基础设施的,用于室内IoT设备(例如智能设备)的带外两因素身份验证方案。由于智能家居环境由多个IoT设备组成,这些设备可以共享其感测到的数据以更好地为用户服务,因此当一个IoT设备被访问时,我们的设计将利用另一设备通过带外通道(光,声音等),以检测访问请求者是否是恶意外部设备。;与智能手机和IoT设备不同,IMD具有最有限的计算和电池资源。我们设计了一种新颖的智能手机辅助访问控制方案,其中使用患者的智能手机来委派繁重的计算以进行身份​​验证和授权。智能手机与IMD编程器之间的通信是通过音频电缆进行的,该音频电缆可以抵抗无线窃听和其他主动攻击。

著录项

  • 作者

    Wu, Longfei.;

  • 作者单位

    Temple University.;

  • 授予单位 Temple University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 170 p.
  • 总页数 170
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号