SlideShare una empresa de Scribd logo
1 de 67
CASA: Context-Aware 
Scalable Authentication 
Eiji Hayashi, Sauvik Das, Shahriyar Amini 
Jason Hong, Ian Oakley 
Human-Computer Interaction Institute 
Carnegie Mellon University
One Fits All? 
Devices require the same user 
authentication regardless of contexts
If Cost Too Much 
Stop using authentication system
A Few Could Fit All 
How can we choose security lock 
system for different situations? 
Do they provide better security and 
usability from users’ perspectives?
Context-Aware 
Scalable Authentication 
•Authenticate users using active factors 
and passive factors 
•Adjust an active factor based on 
passive factors 
•Quantitative way to choose an active 
factor
Prototype
Outline 
• Underlying Model 
• Feasibility Analysis (Field Study #1) 
• Prototype Evaluation (Field Study #2) 
• Security Analysis 
• Design Iteration (Field Study #3) 
• Conclusion
Outline 
• CASA Framework 
• Feasibility Analysis (Field Study #1) 
• Prototype Evaluation (Field Study #2) 
• Security Analysis 
• Design Iteration (Field Study #3) 
• Conclusion
CASA Framework
Combining Multiple Factors
Combining Multiple Factors 
The probability that a person is a 
legitimate user given a set of signals
Combining Multiple Factors 
The probability that a person is NOT a 
legitimate user given a set of signals
Combining Multiple Factors 
Weight that balances false positives 
and false negatives
Combining Multiple Factors 
Authenticate: A user is more likely to 
be a legitimate user
Combining Multiple Factors 
Reject: A user is less likely to be a 
legitimate user
Naive Bayes Model
Prototype Evaluation 
(Field Study #2)
Field Study #2 
Test system that changes authentication 
schemes based on location
Choosing an Authentication Scheme 
Location Active Factor 
Home ? 
Workplace PIN 
Other Places ?
Naive Bayes Model
Compare Confidence 
Type PIN Be at workplace 
Type PIN Be at other place
Compare Confidence
Compare Confidence
Compare Confidence 
Type PIN Be at workplace 
Type Password Be at other place
Compare Confidence
Chosen Authentication Scheme 
Location Active Factor 
Home ? 
Workplace PIN 
Other Places Password
Two Conditions 
Location w/ PIN w/o PIN 
Home PIN None 
Workplace PIN None 
Other Places Password PIN
Screenshots
Field Study #2 
• 32 participants 
• 18 to 40 years old (mean=24) 
• On their phones 
• For 2 weeks
Result: # of Activations 
Condition Home Workplace Other Places 
w/o PIN None 
13.1 (1.4) 
None 
2.5 (0.4) 
PIN 
8.1 (1.1) 
w/ PIN PIN 
24.5 (3.2) 
PIN 
7.1 (1.0) 
Password 
15.7 (2.0)
Result: # of Activations 
Condition Home Workplace Other Places 
w/o PIN 65.8% 34.2% 
w/ PIN 66.8% 33.2%
Result: User Feedback 
Condition Easy to 
understand Secure Prefer to use 
w/o PIN 5 4 3.5 
w/ PIN 4 4 3
Quotes 
P3 said, “I don't normally use a security 
lock, but I would be much more inclined to 
use one if it didn't require constant 
unlocking.”
Quotes 
P5 said, “I like the system. It’s a great pain 
to type pin at home, because the nature of 
the phone, it goes to sleep quickly, then I 
have to type pin again, which is super 
annoying.”
Quotes 
P12 said, “Typing passwords to check text 
was annoying. I don't think I will use it.”
Appropriate Security Level 
Location Using PIN No Security Locks 
Home None 
Workplace 
Other Places PIN
Appropriate Security Level 
Location Using PIN No Security Locks 
Home PIN 
Workplace PIN 
Other Places PIN
Appropriate Security Level 
Location Using PIN No Security Locks 
Home PIN None 
Workplace PIN 
Other Places PIN
Appropriate Security Level 
Location Using PIN No Security Locks 
Home PIN None 
Workplace PIN None 
Other Places PIN None
Design Iteration 
(Field Study #3)
Design Iteration 
• Appropriate security level 
• Workplace is not as safe as home
Appropriate Security Level 
Location Active Factor 
Home None 
Workplace 
Other Places
Appropriate Security Level 
Location Active Factor 
Home None 
Workplace 
Other Places PIN
Workplace is not safe 
+ 
No Active Factor Be at Home 
+ 
No Active Factor Be at Workplace
Workplace is not safe 
+ 
No Active Factor Be at Home 
+ 
Type PIN Be at Workplace
Workplace is not safe 
+ 
No Active Factor Be at Home 
No Active Factor + + 
Using Computer Be at Workplace
Active Factor Selection 
Location Active Factor 
Home None 
Workplace when using computers None 
Workplace when not using computers PIN 
Others PIN
Notification
Field Study #3 
• 18 participants 
• 21 to 40 years old (mean=26.3) 
• On their phones and laptops 
• For 10 to 14 days
Result: At Workplace 
Grey: Computer not used 
Black: Computer used
Result: User Feedback 
Feature Easy to 
understand Useful Secure Prefer to 
use 
Location-based 
5 4.5 4 4 
Comp-based 
4.5 4 3.5 3.5 
Notification - 4 - 4
Quote 
• P17 said, “It is annoying to use security 
locks all the time, but whereas if I had 
such a system which requires pin only 
at unsecure places its usefulness adds 
more value when compared to the 
annoyance caused by it. So, I will 
definitely use it.”
Conclusion 
• Proposed a Naive Bayes framework to 
combine multiple factors to adjust active 
authentication schemes 
• The framework allowed us to choose 
active factor in a quantitative way 
• Field studies indicated that users 
preferred the proposed system
Backup
Feasibility Analysis 
(Field Study #1)
Location as a Signal 
• People have their own mobility patterns 
• Random people don’t have access to 
certain places
Field Study #1 
• Where do people log in to their phones? 
• 32 participants 
• 7 to 140 days 
PPllaaccee MMeeaann TTiimmee [[%%]] MMeeaann AAccttiivvaattiioonn [[%%]] 
1 (Home) 38.9 31.9 
2 (Workplace) 18.7 28.9 
Others 42.4 39.2
Security Analysis
Security Analysis 
Condition 
Knowledge about target users 
Uninformed Informed 
Technical 
expertise 
Novice Uninformed Novice Informed Novice 
Expert Uninformed Expert Informed Expert
Security Analysis 
Condition 
Knowledge about target users 
Uninformed Informed 
Technical 
expertise 
Novice Uninformed Novice Informed Novice 
Expert Uninformed Expert Informed Expert 
Strangers 
•CASA is as strong as PIN/password
Security Analysis 
Condition 
Knowledge about target users 
Uninformed Informed 
Technical 
expertise 
Novice Uninformed Novice Informed Novice 
Expert Uninformed Expert Informed Expert 
Family members, Friends, Co-workers 
•Trusted people 
•However, users trust co-workers less
Security Analysis 
Condition 
Knowledge about target users 
Uninformed Informed 
Technical 
expertise 
Novice Uninformed Novice Informed Novice 
Expert Uninformed Expert Informed Expert 
Dedicated attackers 
•Rare, but difficult to prevent 
•Detection rather than prevention
Adjusting Security Levels
Results: # of Activations 
Gray: w/ PIN 
Black: w/o PIN
Compare Confidence
Result: User Feedback 
Condition Easy to 
understand Secure Prefer to use 
w/o PIN 5 4 3.5 
w/ PIN 
4 4 3 
3 4
Compare Confidence

Más contenido relacionado

La actualidad más candente

Information Needs for Software Development Analytics
Information Needs for Software Development AnalyticsInformation Needs for Software Development Analytics
Information Needs for Software Development Analytics
Ray Buse
 
MSR End of Internship Talk
MSR End of Internship TalkMSR End of Internship Talk
MSR End of Internship Talk
Ray Buse
 
Towards a Theory of Developer Satisfaction and Productivity
Towards a Theory of Developer Satisfaction and ProductivityTowards a Theory of Developer Satisfaction and Productivity
Towards a Theory of Developer Satisfaction and Productivity
Margaret-Anne Storey
 
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
Chakkrit (Kla) Tantithamthavorn
 
Analytics for software development
Analytics for software developmentAnalytics for software development
Analytics for software development
Thomas Zimmermann
 
A Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
A Study of the Quality-Impacting Practices of Modern Code Review at Sony MobileA Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
A Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
SAIL_QU
 
Programming with GUTs
Programming with GUTsProgramming with GUTs
Programming with GUTs
catherinewall
 
JonWieser_SoftwareDevResume2016
JonWieser_SoftwareDevResume2016JonWieser_SoftwareDevResume2016
JonWieser_SoftwareDevResume2016
Jon Wieser
 

La actualidad más candente (20)

Information Needs for Software Development Analytics
Information Needs for Software Development AnalyticsInformation Needs for Software Development Analytics
Information Needs for Software Development Analytics
 
MSR End of Internship Talk
MSR End of Internship TalkMSR End of Internship Talk
MSR End of Internship Talk
 
On to code review lessons learned at microsoft
On to code review lessons learned at microsoftOn to code review lessons learned at microsoft
On to code review lessons learned at microsoft
 
MDD and the Tautology Problem: Discussion Notes.
MDD and the Tautology Problem: Discussion Notes.MDD and the Tautology Problem: Discussion Notes.
MDD and the Tautology Problem: Discussion Notes.
 
Penetration testing services
Penetration testing servicesPenetration testing services
Penetration testing services
 
Can we induce change with what we measure?
Can we induce change with what we measure?Can we induce change with what we measure?
Can we induce change with what we measure?
 
Towards a Theory of Developer Satisfaction and Productivity
Towards a Theory of Developer Satisfaction and ProductivityTowards a Theory of Developer Satisfaction and Productivity
Towards a Theory of Developer Satisfaction and Productivity
 
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
Leveraging HPC Resources to Improve the Experimental Design of Software Analy...
 
Analytics for software development
Analytics for software developmentAnalytics for software development
Analytics for software development
 
A Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
A Study of the Quality-Impacting Practices of Modern Code Review at Sony MobileA Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
A Study of the Quality-Impacting Practices of Modern Code Review at Sony Mobile
 
Core define and_win_cmd_line gr
Core define and_win_cmd_line grCore define and_win_cmd_line gr
Core define and_win_cmd_line gr
 
Software Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and SecuritySoftware Analytics: Data Analytics for Software Engineering and Security
Software Analytics: Data Analytics for Software Engineering and Security
 
Exploratory testing and the mobile tester : A presentation by Jon Hagar
Exploratory testing and the mobile tester : A presentation by Jon HagarExploratory testing and the mobile tester : A presentation by Jon Hagar
Exploratory testing and the mobile tester : A presentation by Jon Hagar
 
Programming with GUTs
Programming with GUTsProgramming with GUTs
Programming with GUTs
 
Voxxed Athens 2018 - The secret for high quality software: Listen to your people
Voxxed Athens 2018 - The secret for high quality software: Listen to your peopleVoxxed Athens 2018 - The secret for high quality software: Listen to your people
Voxxed Athens 2018 - The secret for high quality software: Listen to your people
 
Controlled experiments, Hypothesis Testing, Test Selection, Threats to Validity
Controlled experiments, Hypothesis Testing, Test Selection, Threats to ValidityControlled experiments, Hypothesis Testing, Test Selection, Threats to Validity
Controlled experiments, Hypothesis Testing, Test Selection, Threats to Validity
 
Long-term IT projects
Long-term IT projectsLong-term IT projects
Long-term IT projects
 
How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises? How Do Students Feel About Automated Security Static Analysis Exercises?
How Do Students Feel About Automated Security Static Analysis Exercises?
 
Software testing
Software testingSoftware testing
Software testing
 
JonWieser_SoftwareDevResume2016
JonWieser_SoftwareDevResume2016JonWieser_SoftwareDevResume2016
JonWieser_SoftwareDevResume2016
 

Destacado

Destacado (18)

Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
 
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimenta...
Increasing Security Sensitivity With Social Proof: A Large-Scale  Experimenta...Increasing Security Sensitivity With Social Proof: A Large-Scale  Experimenta...
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimenta...
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
 
Testing Computer-Assisted Mnemonics and Feedback for Fast Memorization of Hig...
Testing Computer-Assisted Mnemonics and Feedback for Fast Memorization of Hig...Testing Computer-Assisted Mnemonics and Feedback for Fast Memorization of Hig...
Testing Computer-Assisted Mnemonics and Feedback for Fast Memorization of Hig...
 
A Market In Your Social Network: The Effect of Extrinsic Rewards on Friendsou...
A Market In Your Social Network: The Effect of Extrinsic Rewards on Friendsou...A Market In Your Social Network: The Effect of Extrinsic Rewards on Friendsou...
A Market In Your Social Network: The Effect of Extrinsic Rewards on Friendsou...
 
Epistenet: Facilitating Programmatic Access & Processing of Semantically Rela...
Epistenet: Facilitating Programmatic Access & Processing of Semantically Rela...Epistenet: Facilitating Programmatic Access & Processing of Semantically Rela...
Epistenet: Facilitating Programmatic Access & Processing of Semantically Rela...
 
Examining Game World Topology Personalization
Examining Game World Topology PersonalizationExamining Game World Topology Personalization
Examining Game World Topology Personalization
 
Revival Actions in a Shooter Game
Revival Actions in a Shooter GameRevival Actions in a Shooter Game
Revival Actions in a Shooter Game
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on Facebook
 
MI100ロボットでライントレース大会
MI100ロボットでライントレース大会MI100ロボットでライントレース大会
MI100ロボットでライントレース大会
 
Annabel Lee
Annabel LeeAnnabel Lee
Annabel Lee
 
ラクしていい感じのスライドを作るための2つのポイント
ラクしていい感じのスライドを作るための2つのポイントラクしていい感じのスライドを作るための2つのポイント
ラクしていい感じのスライドを作るための2つのポイント
 
パワポは「最後」に開く-すぐできる!プレゼン資料作成術「大掃除編」
パワポは「最後」に開く-すぐできる!プレゼン資料作成術「大掃除編」パワポは「最後」に開く-すぐできる!プレゼン資料作成術「大掃除編」
パワポは「最後」に開く-すぐできる!プレゼン資料作成術「大掃除編」
 
プレゼン基礎講座 2016.11
プレゼン基礎講座 2016.11プレゼン基礎講座 2016.11
プレゼン基礎講座 2016.11
 
しょぼいプレゼンをパワポのせいにするな! by @jessedee
しょぼいプレゼンをパワポのせいにするな! by @jessedeeしょぼいプレゼンをパワポのせいにするな! by @jessedee
しょぼいプレゼンをパワポのせいにするな! by @jessedee
 
色彩センスのいらない配色講座
色彩センスのいらない配色講座色彩センスのいらない配色講座
色彩センスのいらない配色講座
 
見やすいプレゼン資料の作り方 - リニューアル増量版
見やすいプレゼン資料の作り方 - リニューアル増量版見やすいプレゼン資料の作り方 - リニューアル増量版
見やすいプレゼン資料の作り方 - リニューアル増量版
 

Similar a CASA: Context-Aware Scalable Authentication, at SOUPS 2013

From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
CSIRO
 

Similar a CASA: Context-Aware Scalable Authentication, at SOUPS 2013 (20)

Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
PNSQC 2021 January 28 Culture Jam
PNSQC 2021 January 28 Culture JamPNSQC 2021 January 28 Culture Jam
PNSQC 2021 January 28 Culture Jam
 
What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?
 
Hacker vs tools
Hacker vs toolsHacker vs tools
Hacker vs tools
 
Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?Hacker vs Tools: Which to Choose?
Hacker vs Tools: Which to Choose?
 
Risks vs real life
Risks vs real lifeRisks vs real life
Risks vs real life
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

CASA: Context-Aware Scalable Authentication, at SOUPS 2013

Notas del editor

  1. Today, devices require the same authentication regardless of the contexts. for instance, when a phone is at user’s home and in a foreign country which the user has never been to, the phone always require a PIN to unlock. Because of this, we need to design authentication system to be secure even in the most risky case.
  2. However, if security system costs too much, users simply stop using it. In the case of mobile phones, people stop using security lock. Actually, many existing work reported that about half of the users do not use security lock.
  3. This clearly shows that the concept of one fits all does not work well. Then, a question is, do a few fit all? If we have a few security lock system, do they cover all situations? More specifically, How can we choose security lock system for different situations? Do they provide better security and usability for users? These are questions that we investigated in this work.
  4. So, we propose context-aware scalable authentication In
  5. And we tested the framework through filed studies with two rather simple implementations of the framework
  6. I will come back to this term later in this presentation. Now, we can compare confidence levels given by different sets of signals. The next questions is what signal we should combine ----- Meeting Notes (7/9/13 13:09) ----- explain sign
  7. In the second field study, we developed a authentication system that changes authentication schemes based on users’ locations. Then, we tested the system using users’ own phones for two weeks
  8. Now, the question is what authentication schemes we have to use for different locations. For simplicity, we used three locations in our system. Home. workplace ad others. Also, we used three different authentication scheme, None, PIN and password. Finally, we used authentication at workplace as a standard.
  9. Now, we come back to this equation.
  10. We can compare confidence levels from different sets of signals. As an example, let’s compare a scenario where a person types correct PIN at workplace and a scenario where a person types correct PIN at other places.
  11. the first terms in these equation denotes the confidence given by typing a correct PIN. These values can be calculated using entropies of PIN. The second term denotes the confidence given by being at certain locations these values were obtain in the first field study.
  12. When we compare these two, the confidence in the second scenario is smaller than the first one. Intuitively, being at other place provide smaller confidence than being at workplace.
  13. So, if we want the confidence level in the second scenario as high as the one in the first scenario, we have to change the authentication scheme. If a person types a correct password at other places,
  14. it can provide higher confidence than the first scenario ----- Meeting Notes (7/9/13 13:09) ----- entropy
  15. by repeating the process, we came up with the two sets of configurations.
  16. by repeating the process, we came up with the two sets of configurations.
  17. ----- Meeting Notes (7/9/13 13:09) ----- comparison between the first study
  18. ----- Meeting Notes (7/9/13 13:09) ----- add take aways
  19. Qualitative feedback? 10
  20. ----- Meeting Notes (7/25/13 07:30) ----- fix
  21. So, if we want the confidence level in the second scenario as high as the one in the first scenario, we have to change the authentication scheme. If a person types a correct password at other places,
  22. So, if we want the confidence level in the second scenario as high as the one in the first scenario, we have to change the authentication scheme. If a person types a correct password at other places,
  23. So, if we want the confidence level in the second scenario as high as the one in the first scenario, we have to change the authentication scheme. If a person types a correct password at other places,
  24. ----- Meeting Notes (7/25/13 00:46) ----- laptop
  25. ----- Meeting Notes (7/9/13 12:34) ----- location identification
  26. We decided to start from a very simple and effective signal. That is location. Because people have their own mobility patterns, and random people don’t have access to users’ home or workplaces. We thought that location can provide strong confidence about a person’s identity
  27. We conducted two field study to investigate our idea. In the first study, we investigated how much we could improve the usability of user authentication in our system. The results were very positive. 60% of the time, people log into their phones at home or workplace. ----- Meeting Notes (7/9/13 13:09) ----- definition of other places
  28. We categorized attackers in a 2x2 grid.
  29. logfrac{P(PIN|u=1)}{P(PIN|u=-1)}+logfrac{P(W|u=1)}{P(W|u=-1)}\ logfrac{P(A|u=1)}{P(A|u=-1)}+logfrac{P(H|u=1)}{P(H|u=-1)}
  30. logfrac{P(PIN|u=1)}{P(PIN|u=-1)}+logfrac{P(W|u=1)}{P(W|u=-1)}\ logfrac{P(A|u=1)}{P(A|u=-1)}+logfrac{P(H|u=1)}{P(H|u=-1)}