SOUPS2015 2日目
- akirakanaoka
- 1934
- 0
- 0
- 0
implicit authentication - continuously auth #smartphone users through #behavior monitoring #soups2015 paper here: bit.ly/1CZgL4Q
2015-07-25 00:04:23Implicit Authentication for Mobile Devices by @umdcs @CollegeParkMC2 Elaine Shi cited on the big screen at #soups2015
2015-07-25 00:05:48Khan: How security concerns and usability issues affect adoption intention? Two-part study of (pseudo) touch behavior #soups2015
2015-07-25 00:07:17Khan: In the field study, users were interrupted during actual tasks with authentication requests. #soups2015
2015-07-25 00:07:47#soups2015 paper: evaluated annoyance levels w/ 5%, 10%, 20% false reject rate from implicit #authentication #infosec bit.ly/1CZgL4Q
2015-07-25 00:10:31Of 37 participants, 33% use pattern lock, 24% Pin, 38% no auth for #mobile device - #soups2015 paper: bit.ly/1CZgL4Q #infosec
2015-07-25 00:12:22Khan: In the field study, false reject rates were modified (5-20%). Good spread of ages, 40% didn't use authentication #soups2015
2015-07-25 00:13:30Despite interruptions, overall time to complete a task on #mobile decreased by 7% when using implicit #authentication #soups2015
2015-07-25 00:13:33@waitrose You’ve just e-mailed me saying “Summer is for ice cream” It’s the coldest day in weeks and it’s pouring with rain. #soups2015
2015-07-25 00:14:15Khan: People sometimes lost their train of thoughts. Answers to whether system is annoying depend on how it's phrased #soups2015
2015-07-25 00:14:54The talk about location-based passwords I tweeted earlier was given by @aesdeluca. #soups2015
2015-07-25 00:15:42Khan: False accepts were a concern. 2 out of 3 were fine with using implicit authentication as primary or secondary solution #soups2015
2015-07-25 00:16:29I wonder whether people *feel* 7%, though... IOW, is optimisation here the right approach? #soups2015 #cynic twitter.com/eredmil1/statu…
2015-07-25 00:17:17User comments: "Does the lock exist or not?" "Interruptions are annoying, but as soon as I see it, I know it protects me." #soups2015
2015-07-25 00:17:43Interrupts from Implicit #authentication = possible source of annoyance, BUT, reinforces that device is protected! #soups2015
2015-07-25 00:18:16Khan: the usability/security tradeoffs of implicit authentication means that it might be a feasible alternative. #soups2015
2015-07-25 00:19:50Now: Watanabe et al. on inconsistency between descriptions and use of privacy sensitive resources in mobile apps #soups2015
2015-07-25 00:21:13Next up: Understanding Inconsistencies btw Text descript & #Privacy sensative resources of #mobile #apps #soups2015 bit.ly/1DBZcD0
2015-07-25 00:23:09Watanabe: People don't really understand or pay attention to privacy info during installation. #soups2015
2015-07-25 00:26:05Research @: why do test descriptions of #mobile #apps not refer to #privacy sensitive resources? #soups2015 bit.ly/1DBZcD0
2015-07-25 00:26:12Watanabe: Idea is to look at text descriptions, which are read. What potential privacy issues are mentioned? #soups2015
2015-07-25 00:26:46methods for analyzing text descript. of #privacy resources in #mobile apps - #code analysis & text #classification #datascience #soups2015
2015-07-25 00:28:09Watanabe: Code analysis identifies use of privacy-sensitive resources, app text description is searched for mention of this use #soups2015
2015-07-25 00:28:33Watanabe: app descriptions are analyzed using an automatic classifier that uses keywords to spot mentions of privacy resources #soups2015
2015-07-25 00:30:39Text #classifier can divide description into two classes: API used/un-used-> then extract #keywords #mobile #app #security #soups2015
2015-07-25 00:30:40