iLock: Immediate and automatic locking of mobile devices against data theft

Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Mobile device losses and thefts are skyrocketing. The sensitive data hosted on a lost/stolen device are fully exposed to the adversary. Although password-based authentication mechanisms are available on mobile devices, many users reportedly do not use them, and a device may be lost/stolen while in the unlocked mode. This paper presents the design and evaluation of iLock, a secure and usable defense against data theft on a lost/stolen mobile device. iLock automatically, quickly, and accurately recognizes the user's physical separation from his/her device by detecting and analyzing the changes in wireless signals. Once significant physical separation is detected, the device is immediately locked to prevent data theft. iLock relies on acoustic signals and requires at least one speaker and one microphone that are available on most COTS (commodity-off-the-shelf) mobile devices. Extensive experiments on Samsung Galaxy S5 show that iLock can lock the device with negligible false positives and negatives.

Original languageEnglish (US)
Title of host publicationCCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages933-944
Number of pages12
Volume24-28-October-2016
ISBN (Electronic)9781450341394
DOIs
StatePublished - Oct 24 2016
Event23rd ACM Conference on Computer and Communications Security, CCS 2016 - Vienna, Austria
Duration: Oct 24 2016Oct 28 2016

Other

Other23rd ACM Conference on Computer and Communications Security, CCS 2016
CountryAustria
CityVienna
Period10/24/1610/28/16

Fingerprint

Mobile devices
Galaxies
Microphones
Authentication
Acoustics
Experiments

Keywords

  • Audio ranging
  • Device locking
  • Fmcw
  • Smartphone security

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this

Li, T., Chen, Y., Sun, J., Jin, X., & Zhang, Y. (2016). iLock: Immediate and automatic locking of mobile devices against data theft. In CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vol. 24-28-October-2016, pp. 933-944). Association for Computing Machinery. https://doi.org/10.1145/2976749.2978294

iLock : Immediate and automatic locking of mobile devices against data theft. / Li, Tao; Chen, Yimin; Sun, Jingchao; Jin, Xiaocong; Zhang, Yanchao.

CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vol. 24-28-October-2016 Association for Computing Machinery, 2016. p. 933-944.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, T, Chen, Y, Sun, J, Jin, X & Zhang, Y 2016, iLock: Immediate and automatic locking of mobile devices against data theft. in CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. vol. 24-28-October-2016, Association for Computing Machinery, pp. 933-944, 23rd ACM Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, 10/24/16. https://doi.org/10.1145/2976749.2978294
Li T, Chen Y, Sun J, Jin X, Zhang Y. iLock: Immediate and automatic locking of mobile devices against data theft. In CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vol. 24-28-October-2016. Association for Computing Machinery. 2016. p. 933-944 https://doi.org/10.1145/2976749.2978294
Li, Tao ; Chen, Yimin ; Sun, Jingchao ; Jin, Xiaocong ; Zhang, Yanchao. / iLock : Immediate and automatic locking of mobile devices against data theft. CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vol. 24-28-October-2016 Association for Computing Machinery, 2016. pp. 933-944
@inproceedings{504cf02dca9845389b89bdd353aad40c,
title = "iLock: Immediate and automatic locking of mobile devices against data theft",
abstract = "Mobile device losses and thefts are skyrocketing. The sensitive data hosted on a lost/stolen device are fully exposed to the adversary. Although password-based authentication mechanisms are available on mobile devices, many users reportedly do not use them, and a device may be lost/stolen while in the unlocked mode. This paper presents the design and evaluation of iLock, a secure and usable defense against data theft on a lost/stolen mobile device. iLock automatically, quickly, and accurately recognizes the user's physical separation from his/her device by detecting and analyzing the changes in wireless signals. Once significant physical separation is detected, the device is immediately locked to prevent data theft. iLock relies on acoustic signals and requires at least one speaker and one microphone that are available on most COTS (commodity-off-the-shelf) mobile devices. Extensive experiments on Samsung Galaxy S5 show that iLock can lock the device with negligible false positives and negatives.",
keywords = "Audio ranging, Device locking, Fmcw, Smartphone security",
author = "Tao Li and Yimin Chen and Jingchao Sun and Xiaocong Jin and Yanchao Zhang",
year = "2016",
month = "10",
day = "24",
doi = "10.1145/2976749.2978294",
language = "English (US)",
volume = "24-28-October-2016",
pages = "933--944",
booktitle = "CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",

}

TY - GEN

T1 - iLock

T2 - Immediate and automatic locking of mobile devices against data theft

AU - Li, Tao

AU - Chen, Yimin

AU - Sun, Jingchao

AU - Jin, Xiaocong

AU - Zhang, Yanchao

PY - 2016/10/24

Y1 - 2016/10/24

N2 - Mobile device losses and thefts are skyrocketing. The sensitive data hosted on a lost/stolen device are fully exposed to the adversary. Although password-based authentication mechanisms are available on mobile devices, many users reportedly do not use them, and a device may be lost/stolen while in the unlocked mode. This paper presents the design and evaluation of iLock, a secure and usable defense against data theft on a lost/stolen mobile device. iLock automatically, quickly, and accurately recognizes the user's physical separation from his/her device by detecting and analyzing the changes in wireless signals. Once significant physical separation is detected, the device is immediately locked to prevent data theft. iLock relies on acoustic signals and requires at least one speaker and one microphone that are available on most COTS (commodity-off-the-shelf) mobile devices. Extensive experiments on Samsung Galaxy S5 show that iLock can lock the device with negligible false positives and negatives.

AB - Mobile device losses and thefts are skyrocketing. The sensitive data hosted on a lost/stolen device are fully exposed to the adversary. Although password-based authentication mechanisms are available on mobile devices, many users reportedly do not use them, and a device may be lost/stolen while in the unlocked mode. This paper presents the design and evaluation of iLock, a secure and usable defense against data theft on a lost/stolen mobile device. iLock automatically, quickly, and accurately recognizes the user's physical separation from his/her device by detecting and analyzing the changes in wireless signals. Once significant physical separation is detected, the device is immediately locked to prevent data theft. iLock relies on acoustic signals and requires at least one speaker and one microphone that are available on most COTS (commodity-off-the-shelf) mobile devices. Extensive experiments on Samsung Galaxy S5 show that iLock can lock the device with negligible false positives and negatives.

KW - Audio ranging

KW - Device locking

KW - Fmcw

KW - Smartphone security

UR - http://www.scopus.com/inward/record.url?scp=84995426726&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84995426726&partnerID=8YFLogxK

U2 - 10.1145/2976749.2978294

DO - 10.1145/2976749.2978294

M3 - Conference contribution

AN - SCOPUS:84995426726

VL - 24-28-October-2016

SP - 933

EP - 944

BT - CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security

PB - Association for Computing Machinery

ER -