SlideShare a Scribd company logo
Mobile Device Security Using
Transient Authentication
Anthony J. Nicholson, Mark D. Corner and Brian D. Noble

Apresentação por:
Paulo Martins 65929 MERC
Filipe Tavares 65898 MEIC
IEE TRANSACTIONS ON MOBILE COMPUTING, VOL.5, NO.
Motivation
Goal

Proximity Security
PowerPoint 2013
Challenges

• Tie Capabilities to Users
• Do No Harm

• Secure and Restore on People Time
• Ensure Explicit Consent
Challenges & Requirements

• Tie Capabilities to Users
• Detect the presence of authorized users

• Do No Harm
• The system must not require the user’s interaction
• When the user arrives the device must restore itself before the user can even notice it was blocked
Challenges & Requirements
• Secure and Restore on People Time
• When the user leaves the device must secure itself before the attacker would have the change to
physically extract any information

• Ensure Explicit Consent
• The system must not be vulnerable to physical-possession attacks
• Ensure that the user’s device is indeed talking to the user’s Token
• The token is not communication with any other devices without the user’s consent
Challenges & Requirements

• Other Requirements
• Must not require extra Hardware
Related Work
• Disable keyboard and Mouse:
• Vulnerable to physical-possession attacks - Ensure explicit consent

• Biometric information:
• Fingerprint - It is intrusive, since it has a high false negatives rate and restrain users

physically – Do No Harm
• Iris Scan – Requires the three cameras – Extra hardware

• Erasable Memory:
• Requires special hardware – Extra Hardware
Solution
• Token System

• Securing State

• Token Authentication

• Key Management

and Binding
Solution – Token Authentication and Binding
Solution – Securing State
• Persistent Storage
• Virtual Memory
• CPU and Chipset Registers and Caches

• Peripherals
• Displays
Implementation
Securing File Systems
• Using ZIAfs (Zero-Interaction File

System)
• Uses in per-directory keys

Physical Memory
• Encrypts main memory in-place - Kmem
Implementation
Swap Space
•

Use encrypted file to store swap pages or interpose on swap I/O to perform whole-pare encryption.

•

Never encrypt the pages of critical processes.

•

The system must ensure that the encryption keys are pinned in memory.
Implementation
• Video
•

Lock Mouse and Keyboard

•

Blank the frame buffer via Display Manager

• Application-Aware Mechanisms
•

Identify some key processes, that may not be able to survive the hibernation process or that handle
sensitive data
Implementation – Example of Application
Evaluation
•

IBM ThinkPad x24 Notebook – Linux kernel 2.4.20
•

•

256MB RAM

•

•

1.113 GHz Intel Pentium III

30GB IDE Disk Drive – 12ms average seek time

Compaq iPAQ 3870 – Familiar Linux
•

206 MHz StromARM

•

64MB SDRAM

•

32MB Flash ROM
Evaluation – File System
Copy a source tree, traversing the tree and its contents and compiling it
Evaluation – Physical Memory
1.

Freeze execution of all running processes

2.

Encrypt in-place memory the physical memory pages of the frozen processes

3.

Overwrite freed pages and other shared kernel buffers

•

200MB Memory allocated

•

10 Runs (On average 46,740 pages)
Evaluation – Physical Memory
Flush-to-Disk w/ Encryption vs Flush-to-Disk no Encryption vs Encrypt in-place
Evaluation – Swap Space
Evaluation – Microbenchmark
Evaluation – Video & AAM
Evaluation – Video & AAM
Do you have any
Thank You

Questions?

More Related Content

PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
PPTX
Senior Technology Education
PDF
Internet security
PPT
Hacking Question and Answer
PPT
Encryption
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PDF
Using fault injection attacks for digital forensics
PPTX
Mtslesson
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Senior Technology Education
Internet security
Hacking Question and Answer
Encryption
2012 12-04 --ncc_group_-_mobile_threat_war_room
Using fault injection attacks for digital forensics
Mtslesson

What's hot (20)

PPTX
Keyloger & spyware
PDF
1. Mobile Application (In)security
PDF
Revolutionary Security. Ultimate Performance. Minimal Management.
PPTX
Securing embedded systems
PPTX
Building a Hacker Resistant Network
PPTX
​Understanding the Internet of Things
PPTX
Firewall
PDF
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PDF
Technical Vulnerabilities of Electronic Health Records
PPT
Why Go Beyond Encryption
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
PPT
Data security
PDF
[CB19] Hardware Wallet Security
PDF
Lecture 4
PPT
Tek systems it guidelines
PPTX
Necto 16 training 18 access security
PPT
Tek systems it guidelines - animation
PDF
Mvp2
PPTX
Osd diksha presentation
Keyloger & spyware
1. Mobile Application (In)security
Revolutionary Security. Ultimate Performance. Minimal Management.
Securing embedded systems
Building a Hacker Resistant Network
​Understanding the Internet of Things
Firewall
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
Technical Vulnerabilities of Electronic Health Records
Why Go Beyond Encryption
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
Data security
[CB19] Hardware Wallet Security
Lecture 4
Tek systems it guidelines
Necto 16 training 18 access security
Tek systems it guidelines - animation
Mvp2
Osd diksha presentation
Ad

Similar to Mobile device security using transient authentication (20)

PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPT
PPT
PDF
Behind The Code // by Exness
PDF
liferay-safe-slides.pdf
PPTX
Hardware Authentication
PDF
Security Protocols for USB Mass Storage Devices
PDF
2. Asset Security
PPTX
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
PDF
Access Control Presentation
PDF
CISSP Prep: Ch 3. Asset Security
PDF
Psdot 19 four factor password authentication
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner
PDF
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
PPT
Smartcards and Authentication Tokens
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
PDF
CNIT 125 Ch 3. Asset Security
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
Data Securities Corporate Technology Information Presentation
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Behind The Code // by Exness
liferay-safe-slides.pdf
Hardware Authentication
Security Protocols for USB Mass Storage Devices
2. Asset Security
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Access Control Presentation
CISSP Prep: Ch 3. Asset Security
Psdot 19 four factor password authentication
Study notes for CompTIA Certified Advanced Security Practitioner
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Smartcards and Authentication Tokens
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
CNIT 125 Ch 3. Asset Security
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Data Securities Corporate Technology Information Presentation
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology

Mobile device security using transient authentication

  • 1. Mobile Device Security Using Transient Authentication Anthony J. Nicholson, Mark D. Corner and Brian D. Noble Apresentação por: Paulo Martins 65929 MERC Filipe Tavares 65898 MEIC IEE TRANSACTIONS ON MOBILE COMPUTING, VOL.5, NO.
  • 4. Challenges • Tie Capabilities to Users • Do No Harm • Secure and Restore on People Time • Ensure Explicit Consent
  • 5. Challenges & Requirements • Tie Capabilities to Users • Detect the presence of authorized users • Do No Harm • The system must not require the user’s interaction • When the user arrives the device must restore itself before the user can even notice it was blocked
  • 6. Challenges & Requirements • Secure and Restore on People Time • When the user leaves the device must secure itself before the attacker would have the change to physically extract any information • Ensure Explicit Consent • The system must not be vulnerable to physical-possession attacks • Ensure that the user’s device is indeed talking to the user’s Token • The token is not communication with any other devices without the user’s consent
  • 7. Challenges & Requirements • Other Requirements • Must not require extra Hardware
  • 8. Related Work • Disable keyboard and Mouse: • Vulnerable to physical-possession attacks - Ensure explicit consent • Biometric information: • Fingerprint - It is intrusive, since it has a high false negatives rate and restrain users physically – Do No Harm • Iris Scan – Requires the three cameras – Extra hardware • Erasable Memory: • Requires special hardware – Extra Hardware
  • 9. Solution • Token System • Securing State • Token Authentication • Key Management and Binding
  • 10. Solution – Token Authentication and Binding
  • 11. Solution – Securing State • Persistent Storage • Virtual Memory • CPU and Chipset Registers and Caches • Peripherals • Displays
  • 12. Implementation Securing File Systems • Using ZIAfs (Zero-Interaction File System) • Uses in per-directory keys Physical Memory • Encrypts main memory in-place - Kmem
  • 13. Implementation Swap Space • Use encrypted file to store swap pages or interpose on swap I/O to perform whole-pare encryption. • Never encrypt the pages of critical processes. • The system must ensure that the encryption keys are pinned in memory.
  • 14. Implementation • Video • Lock Mouse and Keyboard • Blank the frame buffer via Display Manager • Application-Aware Mechanisms • Identify some key processes, that may not be able to survive the hibernation process or that handle sensitive data
  • 15. Implementation – Example of Application
  • 16. Evaluation • IBM ThinkPad x24 Notebook – Linux kernel 2.4.20 • • 256MB RAM • • 1.113 GHz Intel Pentium III 30GB IDE Disk Drive – 12ms average seek time Compaq iPAQ 3870 – Familiar Linux • 206 MHz StromARM • 64MB SDRAM • 32MB Flash ROM
  • 17. Evaluation – File System Copy a source tree, traversing the tree and its contents and compiling it
  • 18. Evaluation – Physical Memory 1. Freeze execution of all running processes 2. Encrypt in-place memory the physical memory pages of the frozen processes 3. Overwrite freed pages and other shared kernel buffers • 200MB Memory allocated • 10 Runs (On average 46,740 pages)
  • 19. Evaluation – Physical Memory Flush-to-Disk w/ Encryption vs Flush-to-Disk no Encryption vs Encrypt in-place
  • 24. Do you have any Thank You Questions?

Editor's Notes

  • #2: Mencionarquefoifeitoemconjunto com a National Security Agency e a US – National Science Foundation
  • #25: In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.