TY - GEN
T1 - The power of whispering
T2 - 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015
AU - Li, Lingjun
AU - Xue, Guoliang
AU - Zhao, Xinxin
N1 - Publisher Copyright:
Copyright © 2015 ACM.
PY - 2015/4/14
Y1 - 2015/4/14
N2 - Asserting whether two devices are in close proximity is very important to many smartphone assisted security systems. For example, the smartphone based two-factor authentication usually requires the smartphone to stay in close proximity to the other device during authentication. However, relay attacks pose a serious threat to existing approaches for proximity assertions. In this paper, we present a novel near field assertion system that restricts the distance between the two devices to the scale of several centimeters. Our system explores acoustic communications and can prevent relay attacks. The generated assertion is a confidential binary sequence known only to the two devices. Our system is fully automated and light-weight, as demonstrated by extensive evaluations on a prototype.
AB - Asserting whether two devices are in close proximity is very important to many smartphone assisted security systems. For example, the smartphone based two-factor authentication usually requires the smartphone to stay in close proximity to the other device during authentication. However, relay attacks pose a serious threat to existing approaches for proximity assertions. In this paper, we present a novel near field assertion system that restricts the distance between the two devices to the scale of several centimeters. Our system explores acoustic communications and can prevent relay attacks. The generated assertion is a confidential binary sequence known only to the two devices. Our system is fully automated and light-weight, as demonstrated by extensive evaluations on a prototype.
KW - Mobile security
KW - Near field assertions
KW - Relay attacks
UR - http://www.scopus.com/inward/record.url?scp=84942518953&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84942518953&partnerID=8YFLogxK
U2 - 10.1145/2714576.2714586
DO - 10.1145/2714576.2714586
M3 - Conference contribution
AN - SCOPUS:84942518953
T3 - ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
SP - 627
EP - 632
BT - ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
PB - Association for Computing Machinery
Y2 - 14 April 2015 through 17 April 2015
ER -