6,856 research outputs found

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces

    Get PDF
    Physical retailers, who once led the way in tracking with loyalty cards and `reverse appends', now lag behind online competitors. Yet we might be seeing these tables turn, as many increasingly deploy technologies ranging from simple sensors to advanced emotion detection systems, even enabling them to tailor prices and shopping experiences on a per-customer basis. Here, we examine these in-store tracking technologies in the retail context, and evaluate them from both technical and regulatory standpoints. We first introduce the relevant technologies in context, before considering privacy impacts, the current remedies individuals might seek through technology and the law, and those remedies' limitations. To illustrate challenging tensions in this space we consider the feasibility of technical and legal approaches to both a) the recent `Go' store concept from Amazon which requires fine-grained, multi-modal tracking to function as a shop, and b) current challenges in opting in or out of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents significant challenges with its legality in Europe significantly unclear and unilateral, technical measures to avoid biometric tracking likely ineffective. In the case of MAC addresses, we see a difficult-to-reconcile clash between privacy-as-confidentiality and privacy-as-control, and suggest a technical framework which might help balance the two. Significant challenges exist when seeking to balance personalisation with privacy, and researchers must work together, including across the boundaries of preferred privacy definitions, to come up with solutions that draw on both technology and the legal frameworks to provide effective and proportionate protection. Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the Internet of Things Conference, London, United Kingdom, 28-29 March 201

    CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines

    Get PDF
    Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective. The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines. From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research

    Securing Inter-Organizational Workflows in Highly Dynamic Environments through Biometric Authentication

    Get PDF
    High flexibility demands of business processes in an inter-organizational context potentially conflict with existing security needs, mainly implied by regulative and legal requirements. In order to comply with these it has to be ensured that access to information within the workflow is restricted to authorized participants. Furthermore, the system might be required to prove this retrospectively. In highly flexible environments, particularly when documents leave the owner’s security domain, the scope of trust must be expendable throughout the workflow. Usage control provides practical concepts. However, user authentication remains a major vulnerability. In order to ensure effective access control the possibility of process-wide enforcement of strong authentication is needed. Inherently, strong user authentication can be realized applying biometrics, though practical reasons still slow the broad application of biometric authentication methods in common workflow scenarios. This work proposes the combination of usage control and typing biometrics to secure interorganizational workflows in highly dynamic environments. On the one hand, usage control provides high flexibility for document-centric workflows but relies on the enforcement of strong authentication. On the other hand, authentication based on typing is flexible in both deployment and application. Furthermore, the inherent privacy problem of biometrics is significantly weakened by the proposed approach

    Effective Identity Management on Mobile Devices Using Multi-Sensor Measurements

    Get PDF
    Due to the dramatic increase in popularity of mobile devices in the past decade, sensitive user information is stored and accessed on these devices every day. Securing sensitive data stored and accessed from mobile devices, makes user-identity management a problem of paramount importance. The tension between security and usability renders the task of user-identity verification on mobile devices challenging. Meanwhile, an appropriate identity management approach is missing since most existing technologies for user-identity verification are either one-shot user verification or only work in restricted controlled environments. To solve the aforementioned problems, we investigated and sought approaches from the sensor data generated by human-mobile interactions. The data are collected from the on-board sensors, including voice data from microphone, acceleration data from accelerometer, angular acceleration data from gyroscope, magnetic force data from magnetometer, and multi-touch gesture input data from touchscreen. We studied the feasibility of extracting biometric and behaviour features from the on-board sensor data and how to efficiently employ the features extracted to perform user-identity verification on the smartphone device. Based on the experimental results of the single-sensor modalities, we further investigated how to integrate them with hardware such as fingerprint and Trust Zone to practically fulfill a usable identity management system for both local application and remote services control. User studies and on-device testing sessions were held for privacy and usability evaluation.Computer Science, Department o

    Anålise de propriedades intrínsecas e extrínsecas de amostras biométricas para detecção de ataques de apresentação

    Get PDF
    Orientadores: Anderson de Rezende Rocha, HĂ©lio PedriniTese (doutorado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: Os recentes avanços nas ĂĄreas de pesquisa em biometria, forense e segurança da informação trouxeram importantes melhorias na eficĂĄcia dos sistemas de reconhecimento biomĂ©tricos. No entanto, um desafio ainda em aberto Ă© a vulnerabilidade de tais sistemas contra ataques de apresentação, nos quais os usuĂĄrios impostores criam amostras sintĂ©ticas, a partir das informaçÔes biomĂ©tricas originais de um usuĂĄrio legĂ­timo, e as apresentam ao sensor de aquisição procurando se autenticar como um usuĂĄrio vĂĄlido. Dependendo da modalidade biomĂ©trica, os tipos de ataque variam de acordo com o tipo de material usado para construir as amostras sintĂ©ticas. Por exemplo, em biometria facial, uma tentativa de ataque Ă© caracterizada quando um usuĂĄrio impostor apresenta ao sensor de aquisição uma fotografia, um vĂ­deo digital ou uma mĂĄscara 3D com as informaçÔes faciais de um usuĂĄrio-alvo. Em sistemas de biometria baseados em Ă­ris, os ataques de apresentação podem ser realizados com fotografias impressas ou com lentes de contato contendo os padrĂ”es de Ă­ris de um usuĂĄrio-alvo ou mesmo padrĂ”es de textura sintĂ©ticas. Nos sistemas biomĂ©tricos de impressĂŁo digital, os usuĂĄrios impostores podem enganar o sensor biomĂ©trico usando rĂ©plicas dos padrĂ”es de impressĂŁo digital construĂ­das com materiais sintĂ©ticos, como lĂĄtex, massa de modelar, silicone, entre outros. Esta pesquisa teve como objetivo o desenvolvimento de soluçÔes para detecção de ataques de apresentação considerando os sistemas biomĂ©tricos faciais, de Ă­ris e de impressĂŁo digital. As linhas de investigação apresentadas nesta tese incluem o desenvolvimento de representaçÔes baseadas nas informaçÔes espaciais, temporais e espectrais da assinatura de ruĂ­do; em propriedades intrĂ­nsecas das amostras biomĂ©tricas (e.g., mapas de albedo, de reflectĂąncia e de profundidade) e em tĂ©cnicas de aprendizagem supervisionada de caracterĂ­sticas. Os principais resultados e contribuiçÔes apresentadas nesta tese incluem: a criação de um grande conjunto de dados publicamente disponĂ­vel contendo aproximadamente 17K videos de simulaçÔes de ataques de apresentaçÔes e de acessos genuĂ­nos em um sistema biomĂ©trico facial, os quais foram coletados com a autorização do ComitĂȘ de Ética em Pesquisa da Unicamp; o desenvolvimento de novas abordagens para modelagem e anĂĄlise de propriedades extrĂ­nsecas das amostras biomĂ©tricas relacionadas aos artefatos que sĂŁo adicionados durante a fabricação das amostras sintĂ©ticas e sua captura pelo sensor de aquisição, cujos resultados de desempenho foram superiores a diversos mĂ©todos propostos na literature que se utilizam de mĂ©todos tradicionais de anĂĄlise de images (e.g., anĂĄlise de textura); a investigação de uma abordagem baseada na anĂĄlise de propriedades intrĂ­nsecas das faces, estimadas a partir da informação de sombras presentes em sua superfĂ­cie; e, por fim, a investigação de diferentes abordagens baseadas em redes neurais convolucionais para o aprendizado automĂĄtico de caracterĂ­sticas relacionadas ao nosso problema, cujos resultados foram superiores ou competitivos aos mĂ©todos considerados estado da arte para as diferentes modalidades biomĂ©tricas consideradas nesta tese. A pesquisa tambĂ©m considerou o projeto de eficientes redes neurais com arquiteturas rasas capazes de aprender caracterĂ­sticas relacionadas ao nosso problema a partir de pequenos conjuntos de dados disponĂ­veis para o desenvolvimento e a avaliação de soluçÔes para a detecção de ataques de apresentaçãoAbstract: Recent advances in biometrics, information forensics, and security have improved the recognition effectiveness of biometric systems. However, an ever-growing challenge is the vulnerability of such systems against presentation attacks, in which impostor users create synthetic samples from the original biometric information of a legitimate user and show them to the acquisition sensor seeking to authenticate themselves as legitimate users. Depending on the trait used by the biometric authentication, the attack types vary with the type of material used to build the synthetic samples. For instance, in facial biometric systems, an attempted attack is characterized by the type of material the impostor uses such as a photograph, a digital video, or a 3D mask with the facial information of a target user. In iris-based biometrics, presentation attacks can be accomplished with printout photographs or with contact lenses containing the iris patterns of a target user or even synthetic texture patterns. In fingerprint biometric systems, impostor users can deceive the authentication process using replicas of the fingerprint patterns built with synthetic materials such as latex, play-doh, silicone, among others. This research aimed at developing presentation attack detection (PAD) solutions whose objective is to detect attempted attacks considering different attack types, in each modality. The lines of investigation presented in this thesis aimed at devising and developing representations based on spatial, temporal and spectral information from noise signature, intrinsic properties of the biometric data (e.g., albedo, reflectance, and depth maps), and supervised feature learning techniques, taking into account different testing scenarios including cross-sensor, intra-, and inter-dataset scenarios. The main findings and contributions presented in this thesis include: the creation of a large and publicly available benchmark containing 17K videos of presentation attacks and bona-fide presentations simulations in a facial biometric system, whose collect were formally authorized by the Research Ethics Committee at Unicamp; the development of novel approaches to modeling and analysis of extrinsic properties of biometric samples related to artifacts added during the manufacturing of the synthetic samples and their capture by the acquisition sensor, whose results were superior to several approaches published in the literature that use traditional methods for image analysis (e.g., texture-based analysis); the investigation of an approach based on the analysis of intrinsic properties of faces, estimated from the information of shadows present on their surface; and the investigation of different approaches to automatically learning representations related to our problem, whose results were superior or competitive to state-of-the-art methods for the biometric modalities considered in this thesis. We also considered in this research the design of efficient neural networks with shallow architectures capable of learning characteristics related to our problem from small sets of data available to develop and evaluate PAD solutionsDoutoradoCiĂȘncia da ComputaçãoDoutor em CiĂȘncia da Computação140069/2016-0 CNPq, 142110/2017-5CAPESCNP
    • 

    corecore