STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION
|
|
- Esther Eaton
- 6 years ago
- Views:
Transcription
1 STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION Maryam Mehrnezhad Ehsan Toreini Siamak F. Shahandashti Feng Hao Newcastle University, UK At EuroUSEC, July 2016
2 JavaScript-based attack on mobile devices using Motion and Orientation sensors
3 Research Challenge: Low Sampling rate Android Native app: 200 Hz Firefox: up to 50 Hz Chrome: up to 60 Hz ios: Native app: 100 Hz Safari: 20 Hz
4 Implementation Data from mobile users User independent Platform-free: Android/iOS JavaScript, html5, Node.js, Mongodb ANN Sensitive Information Phone-call timing Physical Activities Touch actions PINs
5 Entire PIN on 3rd attempt: 99.48%
6 Impact on industry and academia W3C The standard is being revised W3C Technical/advisory meeting Browsers Acknowledged by Chrome, Firefox, Safari, Opera Patched in Firefox v46 and Apple ios 9.3 Current Solution: Limiting/ Disabling, user permission Security vs usability A project between NCL culture lab and Security group and UCL Strong support from world leading researchers and Google, Qualcomm and W3C
7 WHY DOES THIS VULNERABILITY EXIST? Unmanaged sensors sensing is unmanaged on existing smartphone platforms in-app access to unmanaged sensors is now spreading to in-browser access Different terminology Unknown sensors users are less familiar with the relatively newer (and less advertised) sensors such as motion and orientation User study: to rate the level of their familiarity with each sensor.
8 List of mobile sensors From: iphone 6, Nexus 6S, Android Developers, W3C, Extra sensors (Common sensing hardware) Sensors: WiFi, Bluetooth, NFC Touch Screen, TouchID, Fingerprint, Camera, Microphone, GPS Ambient Pressure, Barometer, Ambient Humidity, Ambient Temperature, Ambient Light, Device Temperature Accelerometer, Gyroscope, Gravity, Magnetic field, Motion, Rotation, Orientation, Proximity Hall Sensor, Sensor Hub
9 Participants 30 participants, 13 male and 17 female Recruited through social and vocational networks 18 to 59 years old, median: 31 Except one, no computer security bg Multiple degree programs and levels, and the remaining participants worked in a different range of fields Owning a wide range of mobile devices, from 0 to 11 years, average: 6 University office, 10 Amazon voucher
10
11
12 Findings Generally surprised and impressed with the variety Newer sensors tend to be less known Generally not familiar with ambient sensors Low-level hardware sensors (acc, gyr) less known in comparison with high-level (motion, ori) High-level sensors are named after their functionalities Software features are more advertised by the mobile vendors
13 Risk Perception of Mobile Sensors Perceived risk level for their PINs being discovered by each sensor Finding one s PIN is a clear and intuitive security risk Putting the perceived risk levels in context with respect to the actual risk levels for a number of sensors Scenario Game app having access to all sensors Opening your banking app Entering your PIN Description of sensors Basic functionalities Further questions
14
15
16 Touch Screen Users are generally concerned However, still about half of our participants were either moderately concerned, a little concerned, or not concerned at all Some comments: Why any of these sensors should be dangerous on an app while I have officially installed it from a legal place such as Google Play? As long as the app with these sensors is in the background, I have no concern at all More general risk model in relation to mobile devices is affecting the users perception
17 Communicational sensors WiFi, Bluetooth, and NFC Users are generally concerned Comment: I am not concerned with physical [motion, orientation, accelerometer, etc.]/ environmental [light, pressure, etc.] sensors, but network ones. Hackers might be able to transfer my information and PIN Fair concern in regard to each sensor capability on the PIN discovery
18 Identity-related sensors Camera, microphone, fingerprint/ TouchID, and GPS Users are generally concerned GPS, fingerprint/touchid can not cause the disclosure of PINs After sensor description, still concerned Camera and Microphone Participant s concern due to other reasons (saying out loud, glasses reflection) Low actual risk Another general risk model
19 Environmental Sensors Ambient sensors (humidity, light, pressure, and temperature) Generally low and stays low after description Were concerned about these sensors simply because they did not know them [now that I know these sensors,] I am quite certain that movement/environmental sensors would not affect the security of personal id/passwords etc. Ambient light and PIN discovery, low actual risk
20 Movement Sensors Orientation, rotation, and motion Know them, but not concerned Accelerometer and gyroscope The risk perception is even lower Comments: In my everyday life, I don t even think about these sensors and their security. There is nothing on the news about their risk High actual risk
21 General knowledge versus risk perception The more the users know about these sensors, the more concern they express Spearman s rank-order correlation measure, r = 0.61, high confidence Not knowing sensors -> no customer demand -> no security design by mobile vendors Not as OS resources
22 Suggested Solutions Academic approach restricting the sensor to one app, reducing the sampling rate, temporal pause of the sensor on sensitive entries such as keyboard, rearranging keyboard for password entrance, asking for explicit permission from the user, ranking apps based on their similarities to malware, and obfuscating anomalies in sensor data Industrial Native app: no consideration JsavaScript No event fires when the page is not visible or is backgrounded Fire events only on the top-level browsing context or same-origin nested iframes Limit the frequency of events (60 Hz)
23 Conclusion and Discussion Sensors on mobile devices are booming Their security is not managed Current solutions are not usable enough Users are not generally concerned or even familiar with sensors Designing a practical solution is not straightforward Having control on granting access before running a website during working with it full control on reviewing, updating and deleting these data, if stored by the website or shared with a third party afterwards a smart notification feature on the browser
24 THANKS Q&A
This is a repository copy of TouchSignatures : Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript.
This is a repository copy of TouchSignatures : Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/117981/
More informationFusing Sensors into Mobile Operating Systems & Innovative Use Cases
Fusing Sensors into Mobile Operating Systems & Innovative Use Cases May 23, 2012 Tristan Joo (tristanjoo@wca.org) Board Director & Co-Chair of Mobile SIG Wireless Communications Alliance, Independent Executive
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationSE 3S03 - Tutorial 1. Zahra Ali. Week of Feb 1, 2016
SE 3S03 - Tutorial 1 Department of Computer Science McMaster University naqvis7@mcmaster.ca Week of Feb 1, 2016 testing vs Software Devices and s Devices and s App Device Outline testing vs Software Devices
More informationOverview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!
Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research
More informationSystem requirements. Display requirements. PDF reader requirements. Fingerprint Login/Touch Authentication requirements
System requirements The computer you use must meet the following minimum requirements: PC or Mac with at least a 1-GHz processor and 1 GB of RAM. Available browser updates applied for improved security
More informationOnline and Mobile Banking Requirements Guide
Online and Mobile Banking Requirements Guide Introduction This document explains the hardware and software requirements for Valley First Credit Union s Online and Mobile Banking Experience. Members are
More informationMobile Computing Meets Research Data
Mobile Computing Meets Research Data Engineer Bainomugisha Pilot Research Data Center Workshop Mombasa/Kenya Software Languages Lab. Department of Computer Science Vrije Universiteit Brussel, Belgium Department
More informationTablet - is the generic term for a mobile computer with touchscreen display that is operated with fingers or stylus pen instead of a mouse and
Mobile Computing What is this? Tablet - is the generic term for a mobile computer with touchscreen display that is operated with fingers or stylus pen instead of a mouse and keyboard. Walmart defines a
More informationANDROID TABLETS & SMARTPHONES. JB Burke Your OLLI Android Facilitator/Teacher/Moderator/etc (Cell)
ANDROID TABLETS & SMARTPHONES JB Burke Your OLLI Android Facilitator/Teacher/Moderator/etc. JB2001@Q.com 928-925-9354 (Cell) Components of an Android device Adding a microsd card Not available on all devices
More informationPrivate Browsing: an Inquiry on Usability and Privacy Protection
Private Browsing: an Inquiry on Usability and Privacy Protection Xianyi Gao*, Yulong Yang*, Huiqing Fu*, Janne Lindqvist*, Yang Wang+ *Rutgers University +Syracuse University Published in WPES 2014 What
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationShould the users be informed? Differences in risk perception between Android and iphone users
Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security
More informationPrivacy, Law, and Smartphones
CyLab Privacy, Law, and Smartphones Engineering & Public Policy acy & Secur ity Priv e l :// C DU HT TP ratory bo La Oct. 29, 2015 CyLab U sab Rebecca Balebako U P S.C S.C M U.E 1 Agenda Quiz Reading discussion
More informationThe State of the Trust Gap in 2015
The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years
More informationHead-to-head: Which will win for your business?
Head-to-head: Which will win for your business? When it comes to mobile operating systems (OS), chances are you re already pretty familiar with the big two Apple and Android. There s probably a device
More informationMobile and Ubiquitous Computing: Mobile Sensing
Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,
More informationKAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE
KAUSTUBH DEKATE KEDAR AYACHIT KALPESH BHOIR SAGAR KEDARE DHAWAL JADHAV NITIN DHALE A tablet computer, or simply tablet, is a complete mobile computer, larger than a mobile phone or personal digital assistant,
More informationMOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationMOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationThe new maximum security smartphone No Camera - No GPS - No Recorder
The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is
More informationBETTER TOGETHER. Internet + TV from Elevate Fiber. TV User Guide
BETTER TOGETHER Internet + TV from Elevate Fiber. TV User Guide Stream your favorite shows and movies with Elevate s new high-def TV. Elevate TV is a full-featured digital television service delivered
More informationLIBRARY MEMBER USER GUIDE
LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account...2 Part 2) How to checkout a magazine issue...4 Part 3) How to download Zinio Reader 4...10 a) For your PC...10 b) For your
More informationPreface...3 Acknowledgments...4. Contents...5. List of Figures...17
Contents - 5 Contents Preface...3 Acknowledgments...4 Contents...5 List of Figures...17 Introduction...23 History of Delphi...24 Delphi for mobile platforms...27 About this book...27 About the author...29
More informationfebruary 2013 part 1 of 3
february 2013 part 1 of 3 contents hardware 3 software 10 hardware Microsoft Surface Pro Tablet Initial Reviews Mixed http://bit.ly/129hdn4 http://bit.ly/129hsrr http://nyti.ms/129hv6z -Laptop/Tablet Hybrid
More informationEvent Password: NationalCenter2017 DON T FORGET STEP 2 ON THE NEXT PAGE!
Hi, We ve built a mobile app for 2017 Parents as Teachers International Conference! It has all the important information you ll need for the event, and features to enhance your event experience. Step 1:
More informationMobile Devices and Smartphones
Mobile Devices and Smartphones Smartphone Modern smartphones can do almost as much as a desktop PC could. They are extremely mobile and convenient. With a proper service provider they can access the internet
More informationHow to use Video Conferencing & Desktop Sharing on Magnet Voice
How to use Video Conferencing & Desktop Sharing on Magnet Voice Video Conferencing and Collaboration CONTENTS User Guide... 1 1. How to set up a video session... 2. Running a video conference... 4 3. Screen
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More informationWebSphere Puts Business In Motion. Put People In Motion With Mobile Apps
WebSphere Puts Business In Motion Put People In Motion With Mobile Apps Use Mobile Apps To Create New Revenue Opportunities A clothing store increases sales through personalized offers Customers can scan
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationLive Guide Co-browsing
TECHNICAL PAPER Live Guide Co-browsing Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over
More informationNORTON WI-FI RISK REPORT: U.S. Results
NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers
More informationPrivacy-ABC Technologies on Mobile Phones
Privacy-ABC Technologies on Mobile Phones Dr. Gert Læssøe Mikkelsen, Alexandra Institute A/S ABC4Trust Summit Event Brussels, January 20, 2015 A research project funded by the European Commission s 7th
More informationDigital Marketing, Privacy, and New Technologies. Jules Polonetsky, CEO Future of Privacy Forum
Digital Marketing, Privacy, and New Technologies Jules Polonetsky, CEO Future of Privacy Forum 9.26.17 Future of Privacy Forum The Members 140+ Companies 25+ Leading Academics 10+ Advocates The Mission
More informationHow To Install Flash Firefox Android Tablet Os On Hp
How To Install Flash Firefox Android Tablet Os On Hp Adobe may have cut support for Flash in Android Jelly Bean and beyond, but it's not don't officially support Flash, it's really easy to add Flash support
More informationPNC.com, Weather.com & SouthWest.com. Usability Analysis. Tyler A. Steinke May 8, 2014 IMS 413
PNC.com, Weather.com & SouthWest.com Usability Analysis Tyler A. Steinke May 8, 2014 IMS 413 2 P a g e S t e i n k e Table of Contents Introduction 3 Executive Summary 3 Methodology 4 Results 4 Recommendations
More informationUser Help
ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...
More informationAndroid - open source mobile platform
Android - open source mobile platform Alexander Schreiber http://www.thangorodrim.de/ Chemnitzer Linux-Tage 2009 Alexander Schreiber Android - open source mobile
More informationCNT-IP-2 Web Enabled Serial Controller
CNT-IP-2 Web Enabled Controller Quick Start Guide Order toll-free in the U.S. 800-959-6439 For technical support, call 714-641-6607 Hall Research, 1163 Warner Ave. Tustin, CA 92780 www.hallresearch.com
More informationDuo Security Enrollment Guide
Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,
More informationSMARTWATCH User Manual
SMARTWATCH User Manual Please refer to this manual before using your LOGIC LIFE 30 SmartWatch. ENGLISH Pages OVERVIEW 3 CHARGING 4 USABILITY 5 PAIRING 6-7 FUNCTIONS 8-12 TECHNICAL SPECIFICATIONS 13 2 1.
More informationGetting Started for Moderators Quick Reference Guide
Practice before leading your first session. Become familiar with the session content. Open web pages, applications needed for application sharing and screen captures before session begins. Load multimedia
More informationDuo Security Enrollment Guide
Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,
More informationORGANIZING MOBILE WEB
ORGANIZING MOBILE WEB EXPERIENCES @lukew EXTENSION LEARN LUKE WROBLEWSKI 1 378K iphones sold per day 562K ios devices 371K Babies born per day 1M Android devices activated per day 200K Nokia smartphones
More informationAndroid OS. Operating System based on Linux [ ] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus]
1 Android OS Operating System based on Linux [24-02-16] [Jonas Teuscher, Alex Cuordileone, Cédric Glaus] 1 https://www.androidpit.com/android-marshmallow-update-overview-for-smartphones-and-tablets 2 https://blog.idrsolutions.com/2014/12/android-apps-ide-for-java-coder-programmers/
More informationTELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual. WiFi ARVIG arvig.net/wifitv. Delivered by Arvig
TELEVISION WiFi Plans WiFi Delivered by Arvig Interactive Guide and DVR (Digital Video Recorder) Manual 888.99.ARVIG arvig.net/wifitv TABLE OF CONTENTS Getting Started My Arvig Registration...1 Supported
More informationSecure Authentication for Internet environment using Biometric and One-Time Password
UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time
More informationIphone Usb Tethering Windows 7 No Internet. Access >>>CLICK HERE<<<
Iphone Usb Tethering Windows 7 No Internet Access If you're unable to get your iphone or ipad online because there's no Wi-Fi signal On a Windows PC, you can use the Internet Connection Sharing feature
More informationViewersLogic - Installation guide
ViewersLogic - Installation guide General Thank you for joining the ViewersLogic (VL) media panel. Before you install the app, please make sure you meet the following requirements: 1) Have a Home Wi-Fi
More informationEMBEDDED SYSTEMS AND MOBILE SYSTEMS
EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery
More informationCopyright
Copyright NataliaS@portnov.com 1 EMULATORS vs Real Devices USER EXPERIENCE AND USABILITY User Interactions Real occurring events Overall performance Consistency in results SPECTRUM OF DEVICE CONFIGURATIONS
More informationVerseOne Introductions
VerseOne Introductions Andrew Neilson Digital Strategy & Information Architect Michele Gaudelli Sales and Marketing Director John Sexton Web Developer & Usability Expert Penny Everett Web Accessibility
More informationCopyright
Copyright NataliaS@portnov.com 1 Overview: Mobile APPS Categories Types Distribution/Installation/Logs Mobile Test Industry Standards Remote Device Access (RDA) Emulators Simulators Troubleshooting Guide
More informationTELEVISION. WiFi Plans. Interactive Guide and DVR (Digital Video Recorder) Manual for the Amazon Fire TV Stick. WiFi ARVIG arvig.
TELEVISION WiFi Plans WiFi Delivered by Arvig Interactive Guide and DVR (Digital Video Recorder) Manual for the Amazon Fire TV Stick 888.99.ARVIG arvig.net/wifitv TABLE OF CONTENTS Getting Started My
More informationKaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,
Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms
More informationMIGRATING FROM WINDOWS XP
MIGRATING FROM WINDOWS XP WHAT S THE PROBLEM WITH XP? Microsoft is no longer providing security updates for XP after April 8, 2014 After this date, Microsoft Security Essentials (MSE) for XP will no longer
More informationBUYING PERSONAL COMPUTERS AND SMART DEVICES SOUTHEAST COASTAL GEORGIA COMPUTER CLUB - CHARLES MURPHY
BUYING PERSONAL COMPUTERS AND SMART DEVICES SOUTHEAST COASTAL GEORGIA COMPUTER CLUB - CHARLES MURPHY Getting Started Types Features Brands Shopping Tips Consider Tech Support Overview Explosion of personal
More informationPivot Full Manual. The All-in-One Smart Hub Solution
Pivot Full Manual The All-in-One Smart Hub Solution Table of Contents Getting Started...3 Overview... 3 What s in the box... 3 Pivot... 3 Door & Window Sensors... 6 Zmodo App... 6 Zmodo Web App... 6 Setup...7
More informationRemotely accessing GPH ICT systems
Remotely accessing GPH ICT systems Version: 1.7 CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device... 4
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationThe Google Maps app for iphone and ipad makes navigating your world faster and easier. Voice-guided GPS navigation for driving, biking, and walking
Google Maps Earth App For Iphone 4 Voice Navigation Try these quick fixes to improve voice-guided navigation in the Google Maps app. Can't hear voice navigation? Here are a couple tips if you're using
More informationTHE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS
SESSION ID: MBS-W04 THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS Nadir Izrael CTO & Co-Founder Armis, Inc. Ben Seri Head of Research Armis, Inc. Placeholder Slide: Image of spread of infection Placeholder
More informationCopyright 2017, Zighra Inc.
Zighra core AI based Adaptive Authentication Engine Patent (US Patent# - 9619852) 1. What does this cover? Zighra s patent answers the security question who is the real user behind a transaction or device?
More informationStop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico
1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become
More informationTopic Course Activities
The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge
More informationSMARTWATCH User Manual
SMARTWATCH User Manual Please refer to this manual before using your LOGIC LIFE 20 SmartWatch. ENGLISH Pages OVERVIEW 3 CHARGING 4 USABILITY 5 PAIRING 6-7 FUNCTIONS 8-12 TECHNICAL SPECIFICATIONS 13 2 1.
More informationUse of ISP1507-AL Evaluation Boards
Use of ISP1507-AL Evaluation Boards Application Note AN181103 Introduction Scope This document gives details on hardware and software for using and testing Insight SiP Bluetooth Low Energy module ISP1507-AL,
More informationIntroduction to Android Tablets and Smartphones
The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,
More informationMastering Mobile Web with 8 Key Rules. Mastering Mobile Web with 8 Key Rules
Mastering Mobile Web with 8 Key Rules 1 Introduction When it comes to mobile web design and testing, mobility plays by a far different set of rules than the desktops of years past. Today we are challenged
More informationSecurity and privacy in the smartphone ecosystem: Final progress report
Security and privacy in the smartphone ecosystem: Final progress report Alexios Mylonas Athens University of Economics & Business Overview 2 Research Motivation Related work Objective Approach Methodology
More informationOpening Smart T.V to third-party apps, user perspectives Himanandini Mohanty Faculty sponsor: Fadi Mohsen, University of Michigan-Flint
Opening Smart T.V to third-party apps, user perspectives Himanandini Mohanty Faculty sponsor: Fadi Mohsen, University of Michigan-Flint ABSTRACT A third-party app is any app that is developed by a party
More informationRemotely accessing GPH ICT systems
Remotely accessing GPH ICT systems Version: 1.6 FINAL CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device...
More informationCS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu Authentication using Biometrics Biometrics Passwords tough to remember, manage Many
More informationFarm Sprayer GPS Pro & Pro Software. Operation Manual
Farm Sprayer GPS Pro & Pro Software Operation Manual 1 Table of Contents INSTALLATION OF PRO SOFTWARE 3 UPDATING SOFTWARE 4 SETTING UP THE GPS CABLES & CONNECTORS 5 CONNECTING TO WIFI TO SAVE MAPS 6 OPERATING
More informationBark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University
Bark: Default-Off Networking and Access Control for the IoT James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University The IoT is everywhere So are the attacks... 1. Devices easily compromised
More information9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input
MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationMEMS & Sensors for wearable electronics. Jérémie Bouchaud Director and Senior Principal Analyst IHS Technology
MEMS & Sensors for wearable electronics Jérémie Bouchaud Director and Senior Principal Analyst IHS Technology Outline Wearable electronics market overview MEMS & Sensors in wearable Motion sensors MEMS
More informationU.S. Mobile Benchmark Report
U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral
More informationEvidence.com February 2017 Release Notes
Evidence.com February 2017 Document Revision: B Evidence.com Version 2017.2 Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries. Firefox is a trademark of The
More informationMint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group
Mint Getting Started Guide for Financial Institutions Financial Institution Support OFX Connectivity Group Table of Contents MINT GETTING STARTED GUIDE... 3 ABOUT THIS GUIDE... 3 ABOUT MINT... 4 WHAT IS
More informationSage ERP Accpac Version 6.1. Coming Q4 2011
Sage ERP Accpac Version 6.1 Coming Q4 2011 Sage ERP Accpac 6.1 What s New Improved usability of data entry screens Sage ERP Accpac 6.1 Virtualization Web Deployment Technology Mobile Access Sage ERP Accpac
More informationMobile development initiation
Mobile development initiation Outline Mobile development: o Why? o How? o New issues Android ios 2 Mobile growth ¼ Internet access Sales of smartphones and tablets increase o + 70% tab Community 3 Why
More informationMachine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data
Machine Learning for the Quantified Self Lecture 2 Basic of Sensory Data Dataset (1) During the course we will use a running example provided by CrowdSignals.io People share their mobile sensors data (smart
More informationA MODEL FOR COMPARATIVE ANALYSIS OF THE SIMILARITY BETWEEN ANDROID AND IOS OPERATING SYSTEMS
Bulletin of the Transilvania University of Braşov Series V: Economic Sciences Vol. 7 (56) No. 2-2014 A MODEL FOR COMPARATIVE ANALYSIS OF THE SIMILARITY BETWEEN ANDROID AND IOS OPERATING SYSTEMS R. LIXĂNDROIU
More informationBlackboard Collaborate Ultra
Blackboard Collaborate Ultra Table of Contents Blackboard Collaborate Ultra Overview... 3 Bb Collaborate Terms and Technical Requirements... 3 Technical Suggestions... 3 Mobile devices... 4 What s New
More informationIndoor navigation using smartphones. Chris Hide IESSG, University of Nottingham, UK
Indoor navigation using smartphones Chris Hide IESSG, University of Nottingham, UK Overview Smartphones Available sensors Current positioning methods Positioning research at IESSG 1. Wi-Fi fingerprinting
More informationCambridge Nationals R001. Revision help (LO1)
Cambridge Nationals R001 Revision help (LO1) Portable devices These are electronic devices that can be carried easily. Examples include: Laptops Netbooks Mobile phones Tablets (Ipad, Android Tablet) handheld
More informationIP Cam EdiLife Quick Installation Guide
IP Cam EdiLife Quick Installation Guide 08-2018 / v1.0 CONTENTS l. Product Information... 3 I-1 System Requirements... 3 II Camera Setup... 4 II-1 Hardware Setup... 4 II-2 EdiLife App... 6 II-2-1 Android
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationFeatures. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage
PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device
More informationAndroid Samsung Galaxy S6 Edge
Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,
More informationMicroBot Push User Guide
MicroBot Push User Guide Troubleshooting 24 My Microbot App does not detect my MicroBot Push 24 MicroBot Push keeps disconnecting 25 MicroBot Push is not updating 25 Getting Started 2 Meet MicroBot Push
More informationAn Empirical Analysis of Energy Consumption of Cross-platform Frameworks for Mobile Development
An Empirical Analysis of Energy Consumption of Cross-platform Frameworks for Mobile Development Matteo Ciman 1, Ombretta Gaggi a a Department of Mathematics, University of Padua, Padua, Italy Abstract
More informationEMBEDDED SYSTEMS PROGRAMMING Accessing Hardware
EMBEDDED SYSTEMS PROGRAMMING 2016-17 Accessing Hardware HARDWARE LIST Accelerometer Vector magnetometer (compass) Gyroscope GPS and/or other location facilities (Front/rear) camera Microphone Speaker Battery
More informationMobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma
Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction
More informationFirefox OS App Days. Overview and High Level Architecture. Author: José M. Cantera Last update: March 2013 TELEFÓNICA I+D
Firefox OS App Days Overview and High Level Architecture Author: José M. Cantera (@jmcantera) Last update: March 2013 TELEFÓNICA I+D 1 Introduction What is Firefox OS? A new mobile open OS fully based
More informationApple ios Enterprise Mobility Management (cloud based)
Apple ios Enterprise Mobility Management (cloud based) Codeproof ios EMM offers the following enterprise mobility management and BYOD security features. App Restrictions Block the camera, Safari, App Store,
More information