6 research outputs found
Innovation Labs: Leveraging Openness for Radical Innovation?
A growing range of public, private and civic organisations, from Unicef through Nesta to NHS, now run units known as “innovation labs”. The hopeful assumption they share is that labs, by building on openness among other features, can generate promising solutions to grand challenges of systemic nature. Despite their seeming proliferation and popularisation, the underlying innovation principles embodied by labs have, however, received scant academic attention. This is a missed opportunity, because innovation labs appear to leverage openness for radical innovation in an unusual fashion. Indeed, in this exploratory paper we draw on original interview data and online self-descriptions to illustrate that, beyond convening “uncommon partners” across organisational boundaries, labs apply the principle of openness throughout the innovation process, including the experimentation and development phases. While the emergence of labs clearly forms part of a broader trend towards openness, we show how it transcends established conceptualisations of open innovation (Chesbrough et al., 2006), open science (David, 1998) or open government (Janssen et al., 2012)
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Copresence verification based on context can improve usability and strengthen
security of many authentication and access control systems. By sensing and
comparing their surroundings, two or more devices can tell whether they are
copresent and use this information to make access control decisions. To the
best of our knowledge, all context-based copresence verification mechanisms to
date are susceptible to context-manipulation attacks. In such attacks, a
distributed adversary replicates the same context at the (different) locations
of the victim devices, and induces them to believe that they are copresent. In
this paper we propose DoubleEcho, a context-based copresence verification
technique that leverages acoustic Room Impulse Response (RIR) to mitigate
context-manipulation attacks. In DoubleEcho, one device emits a wide-band
audible chirp and all participating devices record reflections of the chirp
from the surrounding environment. Since RIR is, by its very nature, dependent
on the physical surroundings, it constitutes a unique location signature that
is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR
data with various mobile devices and in a range of different locations. We show
that DoubleEcho mitigates context-manipulation attacks whereas all other
approaches to date are entirely vulnerable to such attacks. DoubleEcho detects
copresence (or lack thereof) in roughly 2 seconds and works on commodity
devices
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use such information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to conclude that they are copresent. In this paper we propose DoubleEcho, a copresence verification scheme based on acoustic Room Impulse Response (RIR) that mitigates context-manipulation attacks. In DoubleEcho, one device emits a short, wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in different locations. DoubleEcho exhibits robustness to context-manipulation attacks with a false positive rate can be as low as 0.089, whereas all other approaches to date are entirely vulnerable to such attacks. The false negative rate can be as low as 0.021. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use such information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to conclude that they are copresent. In this paper we propose DoubleEcho, a copresence verification scheme based on acoustic Room Impulse Response (RIR) that mitigates context-manipulation attacks. In DoubleEcho, one device emits a short, wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in different locations. DoubleEcho exhibits robustness to context-manipulation attacks with a false positive rate can be as low as 0.089, whereas all other approaches to date are entirely vulnerable to such attacks. The false negative rate can be as low as 0.021. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices
DoubleEcho
| openaire: EC/H2020/779852/EU//IoTCrawlerCopresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are copresent. In this paper we propose DoubleEcho, a context-based copresence verification technique that leverages acoustic Room Impulse Response (RIR) to mitigate context-manipulation attacks. In DoubleEcho, one device emits a wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in a range of different locations. We show that DoubleEcho mitigates context-manipulation attacks whereas all other approaches to date are entirely vulnerable to such attacks. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices.Peer reviewe