ABSTRACT
In the past years wearable computing devices, such as head-mounted displays, and ubiquitous computing increasingly gained importance. Head-mounted displays are comprised of a front-facing camera and a little screen in front of the user's eye. They provide their users with a seamless extension of their perceptual abilities in an unobtrusive and user-friendly manner. The Ubic-framework combines these new devices with mathematically sound digital cryptographic primitives and resource-friendly computer vision techniques to provide users with novel security and privacy guarantees in their everyday life. In our hands-on demo we show how Ubic allows users to read encrypted and verify digitally signed physical documents. In addition, we present an identification scheme, which is secure against real-world attacks, such as skimming and shoulder-surfing, but remains user friendly and easily deployable in current infrastructures. The Ubic-framework first appeared at ESORICS 2014.
- Bankrate. Skimming the cash out of your account, 2002.Google Scholar
- E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for Key Management Part 1: General (Revision 3). Technical report, July 2012. Google ScholarDigital Library
- E. A. for Visual Data Security. Visual Security White Paper. 2012.Google Scholar
- M. Simkin, D. Schroder, A. Bulling, and M. Fritz. Bridging the gap between digital cryptography and the physical world. In European Symposium on Research in Computer Security (ESORICS), pages 56--75. Springer-Verlag, 2014.Google ScholarCross Ref
Index Terms
- POSTER: Enhancing Security and Privacy with Google Glass
Recommendations
Ubic: Bridging the Gap between Digital Cryptography and the Physical World
Computer Security - ESORICS 2014Abstract.Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in ...
Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
UbiComp '15: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous ComputingWe propose the use of a single continuous gesture as a novel, intuitive, and efficient mechanism to authenticate a secure communication channel. Our approach builds on a novel algorithm for encoding (at least 20-bits) authentication information as a ...
WebCallerID: Leveraging cellular networks for Web authentication
Web authentication that is both secure and usable remains a challenge. Passwords are vulnerable to phishing attacks, while physical tokens face deployment obstacles. We propose to leverage the authentication infrastructure of cellular networks to ...
Comments