首页 > 最新文献

Proceedings of the 12th annual international conference on Mobile systems, applications, and services最新文献

英文 中文
Demo: I am a smartphone and i can tell my user's walking direction 演示:我是一部智能手机,我可以告诉用户的行走方向
Nirupam Roy, He Wang, Romit Roy Choudhury
We present a demonstration of WalkCompass, a system to appear in the MobiSys 2014 main conference. WalkCompass exploits smartphone sensors to estimate the direction in which a user is walking. We find that several smartphone localization systems in the recent past, including our own, make a simplifying assumption that the user's walking direction is known. In trying to relax this assumption, we were not able to find a generic solution from past work. While intuition suggests that the walking direction should be detectable through the accelerometer, in reality this direction gets blended into various other motion patterns during the act of walking, including up and down bounce, side-to-side sway, swing of arms or legs, etc. WalkCompass analyzes the human walking dynamics to estimate the dominating forces and uses this knowledge to find the heading direction of the pedestrian. In the demonstration we will show the performance of this system when the user holds the smartphone on the palm. A collection of YouTube videos of the demo is posted at http://synrg.csl.illinois.edu/projects/ localization/walkcompass.
我们展示了WalkCompass的演示,该系统将出现在MobiSys 2014主会议上。WalkCompass利用智能手机传感器来估计用户行走的方向。我们发现最近的几个智能手机定位系统,包括我们自己的,都简化了假设用户的行走方向是已知的。在试图放松这个假设的过程中,我们无法从过去的工作中找到一个通用的解决方案。虽然直觉告诉我们,行走方向应该通过加速度计来检测,但实际上,在行走过程中,这个方向被混合到各种其他运动模式中,包括上下弹跳、左右摇摆、手臂或腿的摆动等。WalkCompass分析人类的行走动态来估计主导力,并利用这些知识来找到行人的前进方向。在演示中,我们将展示当用户将智能手机放在手掌上时该系统的性能。演示的YouTube视频集合发布在http://synrg.csl.illinois.edu/projects/ localization/walkcompass上。
{"title":"Demo: I am a smartphone and i can tell my user's walking direction","authors":"Nirupam Roy, He Wang, Romit Roy Choudhury","doi":"10.1145/2594368.2601478","DOIUrl":"https://doi.org/10.1145/2594368.2601478","url":null,"abstract":"We present a demonstration of WalkCompass, a system to appear in the MobiSys 2014 main conference. WalkCompass exploits smartphone sensors to estimate the direction in which a user is walking. We find that several smartphone localization systems in the recent past, including our own, make a simplifying assumption that the user's walking direction is known. In trying to relax this assumption, we were not able to find a generic solution from past work. While intuition suggests that the walking direction should be detectable through the accelerometer, in reality this direction gets blended into various other motion patterns during the act of walking, including up and down bounce, side-to-side sway, swing of arms or legs, etc. WalkCompass analyzes the human walking dynamics to estimate the dominating forces and uses this knowledge to find the heading direction of the pedestrian. In the demonstration we will show the performance of this system when the user holds the smartphone on the palm. A collection of YouTube videos of the demo is posted at http://synrg.csl.illinois.edu/projects/ localization/walkcompass.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Poster: A power-aware mobile app for field scientists 海报:面向野外科学家的能量感知移动应用程序
Bo Wang, Xinghui Zhao, David Chiu
In this poster, we design and implement a mobile application and back-end management system to help field scientists manage data collection, improve real-time communication, and optimize power consumption during a scientific field study.
在这张海报中,我们设计并实现了一个移动应用程序和后端管理系统,以帮助现场科学家在科学实地研究期间管理数据收集,改善实时通信并优化功耗。
{"title":"Poster: A power-aware mobile app for field scientists","authors":"Bo Wang, Xinghui Zhao, David Chiu","doi":"10.1145/2594368.2601463","DOIUrl":"https://doi.org/10.1145/2594368.2601463","url":null,"abstract":"In this poster, we design and implement a mobile application and back-end management system to help field scientists manage data collection, improve real-time communication, and optimize power consumption during a scientific field study.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124117011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo: Yalut -- user-centric social networking overlay 演示:Yalut——以用户为中心的社交网络覆盖
Kanchana Thilakarathna, Xinlong Guan, A. Seneviratne
Yalut is a novel user-centric hybrid content sharing overlay for social networking. Yalut enables the users to retain control over their own data and preserve their privacy, whilst still using the popular centralized services. In this demonstration, we show the feasibility of Yalut by integrating the service with the popular social networking apps on Android devices, Mac and Windows desktop platforms. We show that it is possible to provide the benefits of distributed content sharing on top of the existing centralized services with minimal changes to the content sharing process.
Yalut是一个新颖的以用户为中心的混合内容共享覆盖的社交网络。Yalut使用户能够保留对自己数据的控制并保护他们的隐私,同时仍然使用流行的集中式服务。在这个演示中,我们通过将Yalut服务与Android设备、Mac和Windows桌面平台上流行的社交网络应用程序集成来展示Yalut的可行性。我们展示了在现有集中式服务之上提供分布式内容共享的好处,而对内容共享过程进行最小的更改是可能的。
{"title":"Demo: Yalut -- user-centric social networking overlay","authors":"Kanchana Thilakarathna, Xinlong Guan, A. Seneviratne","doi":"10.1145/2594368.2601465","DOIUrl":"https://doi.org/10.1145/2594368.2601465","url":null,"abstract":"Yalut is a novel user-centric hybrid content sharing overlay for social networking. Yalut enables the users to retain control over their own data and preserve their privacy, whilst still using the popular centralized services. In this demonstration, we show the feasibility of Yalut by integrating the service with the popular social networking apps on Android devices, Mac and Windows desktop platforms. We show that it is possible to provide the benefits of distributed content sharing on top of the existing centralized services with minimal changes to the content sharing process.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demo: Protecting visual secrets with privateeye 演示:用私眼保护视觉秘密
Animesh Srivastava, Landon P. Cox
Consider the following scenario from the not-too-distant future: the CEO of a company is presenting his vision for the next quarter to a small group of co-workers. The CEO trusts everyone in the room, but many in attendance have smartphones and camera-equipped wearable computing devices running third-party apps. The CEO is worried that this third-party software could leak the highly confidential information in his slides and on the whiteboard. This raises the question: how can the CEO prevent apps with camera access from leaking company secrets? First, the CEO must have a way of identifying or marking visual secrets. Markings should be: (1) easy to create by hand and with digital tools, and (2) easy and efficient to recognize by software. Marking visual secrets by placing QR-codes or badges near them makes real-time recognition difficult due to scaling problems (particularly at far distances). Moreover, precisely encoding a two-dimensional region surrounding a visual secret in a QR-code or badge would be too awkward and slow for users. Finally, general-purpose object recognition is too slow and consumes too much energy. In this demo, we present PrivateEye, a system that prevents visual secrets from inadvertently leaking. PrivateEye consists of two pieces: (1) a specification for marking a two-dimensional space as secret, and (2) software on a recording device for recognizing markings and obscuring visual secrets in real-time. Figure 1(a) and 2(a) show examples of how PrivateEye users can define a region containing visual secrets by combining solid and dotted lines. Depending on the medium, users can define secret regions by hand (e.g., on a whiteboard) or use digital tools (e.g., within a presentation). PrivateEye is based on the principle that preventing leaks requires visual information to be withheld from third-party apps until the system can be confident that it is safe to reveal. As a result, PrivateEye works in three phases. Phase 1 requires the camera view to stabilize. During this phase, PrivateEye completely blurs the camera view so that apps cannot infer secret information from an image capture. Once the camera view stabilizes, PrivateEye enters Phase 2, in which the system detects all the rectangles in the camera view. At this point, all the detected rectangles appear blocked to the user (Figure 1(b) and 2(b)). PrivateEye then moves on to Phase 3. In this phase, the system searches each blocked rectangle for secret markings (i.e., dotted rectangles). PrivateEye can safely reveal the content of rectangles without secret markings to an app; however, the system must continue to block any rectangles containing secret markings. If PrivateEye detects that the camera view has changed, then it must return to Phase 1. During the demo, PrivateEye will be running on Google Nexus 4 and Google Glass. We plan to invite the audience to use one of these devices and view some of the objects already marked secret. We will also let them draw the markers
考虑一下在不久的将来的场景:一家公司的首席执行官正在向一小群同事介绍他对下一个季度的愿景。这位首席执行官信任在场的每一个人,但许多与会者都有智能手机和配备摄像头的可穿戴计算设备,运行第三方应用程序。首席执行官担心这个第三方软件会泄露他的幻灯片和白板上的高度机密信息。这就提出了一个问题:这位首席执行官该如何防止带有摄像头访问权限的应用泄露公司机密?首先,首席执行官必须有一种识别或标记视觉秘密的方法。标记应该:(1)易于手工和使用数字工具创建,(2)易于通过软件识别。通过放置qr码或徽章来标记视觉秘密,由于缩放问题(特别是在远距离),使得实时识别变得困难。此外,在qr码或徽章中精确编码视觉秘密周围的二维区域对用户来说过于笨拙和缓慢。最后,通用目标识别速度太慢,能耗大。在这个演示中,我们展示了PrivateEye,一个防止视觉秘密无意中泄露的系统。PrivateEye由两部分组成:(1)将二维空间标记为秘密的规范;(2)记录设备上用于实时识别标记和掩盖视觉秘密的软件。图1(a)和2(a)展示了PrivateEye用户如何通过组合实线和虚线来定义包含视觉秘密的区域的示例。根据媒介的不同,用户可以手工定义秘密区域(例如,在白板上)或使用数字工具(例如,在演示文稿中)。PrivateEye基于防止泄露的原则,要求对第三方应用程序保留视觉信息,直到系统能够确信它是安全的。因此,PrivateEye的工作分为三个阶段。第一阶段需要相机视角稳定。在这个阶段,PrivateEye完全模糊了相机视图,这样应用程序就不能从图像捕获中推断出秘密信息。一旦摄像头视图稳定下来,PrivateEye进入第二阶段,系统会检测摄像头视图中的所有矩形。此时,所有检测到的矩形对用户来说都是阻塞的(图1(b)和2(b))。然后PrivateEye进入第三阶段。在这个阶段,系统搜索每个被封锁的矩形以寻找秘密标记(即,虚线矩形)。PrivateEye可以安全地向应用程序显示没有秘密标记的矩形的内容;然而,系统必须继续阻止任何包含秘密标记的矩形。如果PrivateEye检测到摄像机视图已经改变,那么它必须返回到阶段1。在演示期间,PrivateEye将在谷歌Nexus 4和谷歌Glass上运行。我们计划邀请观众使用其中一个设备,观看一些已经标记为“秘密”的物体。我们也会让他们在白板上的一些文本周围画上标记。这将有助于观众了解PrivateEye的可用性和有效性。
{"title":"Demo: Protecting visual secrets with privateeye","authors":"Animesh Srivastava, Landon P. Cox","doi":"10.1145/2594368.2601467","DOIUrl":"https://doi.org/10.1145/2594368.2601467","url":null,"abstract":"Consider the following scenario from the not-too-distant future: the CEO of a company is presenting his vision for the next quarter to a small group of co-workers. The CEO trusts everyone in the room, but many in attendance have smartphones and camera-equipped wearable computing devices running third-party apps. The CEO is worried that this third-party software could leak the highly confidential information in his slides and on the whiteboard. This raises the question: how can the CEO prevent apps with camera access from leaking company secrets? First, the CEO must have a way of identifying or marking visual secrets. Markings should be: (1) easy to create by hand and with digital tools, and (2) easy and efficient to recognize by software. Marking visual secrets by placing QR-codes or badges near them makes real-time recognition difficult due to scaling problems (particularly at far distances). Moreover, precisely encoding a two-dimensional region surrounding a visual secret in a QR-code or badge would be too awkward and slow for users. Finally, general-purpose object recognition is too slow and consumes too much energy. In this demo, we present PrivateEye, a system that prevents visual secrets from inadvertently leaking. PrivateEye consists of two pieces: (1) a specification for marking a two-dimensional space as secret, and (2) software on a recording device for recognizing markings and obscuring visual secrets in real-time. Figure 1(a) and 2(a) show examples of how PrivateEye users can define a region containing visual secrets by combining solid and dotted lines. Depending on the medium, users can define secret regions by hand (e.g., on a whiteboard) or use digital tools (e.g., within a presentation). PrivateEye is based on the principle that preventing leaks requires visual information to be withheld from third-party apps until the system can be confident that it is safe to reveal. As a result, PrivateEye works in three phases. Phase 1 requires the camera view to stabilize. During this phase, PrivateEye completely blurs the camera view so that apps cannot infer secret information from an image capture. Once the camera view stabilizes, PrivateEye enters Phase 2, in which the system detects all the rectangles in the camera view. At this point, all the detected rectangles appear blocked to the user (Figure 1(b) and 2(b)). PrivateEye then moves on to Phase 3. In this phase, the system searches each blocked rectangle for secret markings (i.e., dotted rectangles). PrivateEye can safely reveal the content of rectangles without secret markings to an app; however, the system must continue to block any rectangles containing secret markings. If PrivateEye detects that the camera view has changed, then it must return to Phase 1. During the demo, PrivateEye will be running on Google Nexus 4 and Google Glass. We plan to invite the audience to use one of these devices and view some of the objects already marked secret. We will also let them draw the markers ","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130872516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones 传感器辅助面部识别:智能手机的增强生物识别认证系统
Shaxun Chen, A. Pande, P. Mohapatra
Facial recognition is a popular biometric authentica-tion technique, but it is rarely used in practice for de-vice unlock or website / app login in smartphones, alt-hough most of them are equipped with a front-facing camera. Security issues (e.g. 2D media attack and vir-tual camera attack) and ease of use are two important factors that impede the prevalence of facial authentica-tion in mobile devices. In this paper, we propose a new sensor-assisted facial authentication method to over-come these limitations. Our system uses motion and light sensors to defend against 2D media attacks and virtual camera attacks without the penalty of authenti-cation speed. We conduct experiments to validate our method. Results show 95-97% detection rate and 2-3% false alarm rate over 450 trials in real-settings, indicat-ing high security obtained by the scheme ten times faster than existing 3D facial authentications (3 sec-onds compared to 30 seconds).
面部识别是一种流行的生物识别认证技术,但它很少用于智能手机的设备解锁或网站/应用程序登录,尽管大多数智能手机都配备了前置摄像头。安全问题(如2D媒体攻击和虚拟摄像头攻击)和易用性是阻碍面部认证在移动设备中普及的两个重要因素。在本文中,我们提出了一种新的传感器辅助面部认证方法来克服这些限制。我们的系统使用运动和光传感器来防御2D媒体攻击和虚拟摄像机攻击,而不会影响身份验证速度。我们进行实验来验证我们的方法。结果表明,经过450次实际测试,该方案的检测率为95-97%,虚警率为2-3%,安全性比现有的3D人脸认证快10倍(3秒比30秒)。
{"title":"Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones","authors":"Shaxun Chen, A. Pande, P. Mohapatra","doi":"10.1145/2594368.2594373","DOIUrl":"https://doi.org/10.1145/2594368.2594373","url":null,"abstract":"Facial recognition is a popular biometric authentica-tion technique, but it is rarely used in practice for de-vice unlock or website / app login in smartphones, alt-hough most of them are equipped with a front-facing camera. Security issues (e.g. 2D media attack and vir-tual camera attack) and ease of use are two important factors that impede the prevalence of facial authentica-tion in mobile devices. In this paper, we propose a new sensor-assisted facial authentication method to over-come these limitations. Our system uses motion and light sensors to defend against 2D media attacks and virtual camera attacks without the penalty of authenti-cation speed. We conduct experiments to validate our method. Results show 95-97% detection rate and 2-3% false alarm rate over 450 trials in real-settings, indicat-ing high security obtained by the scheme ten times faster than existing 3D facial authentications (3 sec-onds compared to 30 seconds).","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization 用于小型移动设备的无处不在的键盘:利用多路径衰落实现细粒度击键定位
Junjue Wang, Kaichen Zhao, Xinyu Zhang, Chunyi Peng
A well-known bottleneck of contemporary mobile devices is the inefficient and error-prone touchscreen keyboard. In this paper, we propose UbiK, an alternative portable text-entry method that allows user to make keystrokes on conventional surfaces, e.g., wood desktop. UbiK enables text-input experience similar to that on a physical keyboard, but it only requires a keyboard outline printed on the surface or a piece of paper atop. The core idea is to leverage the microphone on a mobile device to accurately localize the keystrokes. To achieve fine-grained, centimeter scale granularity, UbiK extracts and optimizes the location-dependent multipath fading features from the audio signals, and takes advantage of the dual-microphone interface to improve signal diversity. We implement UbiK as an Android application. Our experiments demonstrate that UbiK is able to achieve above 95% of localization accuracy. Field trial involving first-time users shows that UbiK can significantly improve text-entry speed over current on-screen keyboards.
当代移动设备的一个众所周知的瓶颈是效率低下和易出错的触摸屏键盘。在本文中,我们提出了UbiK,这是一种可替代的便携式文本输入方法,允许用户在传统表面(例如木桌面)上进行按键。UbiK提供了类似于物理键盘的文本输入体验,但它只需要在键盘表面打印一个键盘轮廓或在上面放一张纸。其核心思想是利用移动设备上的麦克风来精确定位击键。为了实现细粒度、厘米尺度的粒度,UbiK从音频信号中提取并优化位置相关的多径衰落特征,并利用双麦克风接口提高信号分集。我们将UbiK作为Android应用程序来实现。我们的实验表明,UbiK能够达到95%以上的定位精度。涉及首次用户的现场试验表明,UbiK可以显著提高当前屏幕键盘的文本输入速度。
{"title":"Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization","authors":"Junjue Wang, Kaichen Zhao, Xinyu Zhang, Chunyi Peng","doi":"10.1145/2594368.2594384","DOIUrl":"https://doi.org/10.1145/2594368.2594384","url":null,"abstract":"A well-known bottleneck of contemporary mobile devices is the inefficient and error-prone touchscreen keyboard. In this paper, we propose UbiK, an alternative portable text-entry method that allows user to make keystrokes on conventional surfaces, e.g., wood desktop. UbiK enables text-input experience similar to that on a physical keyboard, but it only requires a keyboard outline printed on the surface or a piece of paper atop. The core idea is to leverage the microphone on a mobile device to accurately localize the keystrokes. To achieve fine-grained, centimeter scale granularity, UbiK extracts and optimizes the location-dependent multipath fading features from the audio signals, and takes advantage of the dual-microphone interface to improve signal diversity. We implement UbiK as an Android application. Our experiments demonstrate that UbiK is able to achieve above 95% of localization accuracy. Field trial involving first-time users shows that UbiK can significantly improve text-entry speed over current on-screen keyboards.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133363772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 145
Video: User-generated free-form gestures for authentication: security and memorability 视频:用户生成的自由形式的身份验证手势:安全性和可记忆性
Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, J. Lindqvist, Antti Oulasvirta, Teemu Roos
This is a video demonstration for a full paper available in MobiSys'14 proceedings http://dx.doi.org/10.1145/2594368.2594375. The video demonstrates several forms of authentication on a common tablet, and compares them to our method for gesture-based authentication. Our method measures the security and memorability of user generated free-form gestures by estimating the mutual information of repeated gestures. We show examples of such gestures with high and low mutual information content. We also show what information from each is visible to a shoulder surfing attacker, and describe how our system is resistant to such an attack.
这是MobiSys 14届会议论文集http://dx.doi.org/10.1145/2594368.2594375中完整论文的视频演示。该视频演示了在普通平板电脑上的几种身份验证形式,并将它们与我们基于手势的身份验证方法进行了比较。我们的方法通过估计重复手势的互信息来衡量用户生成的自由形式手势的安全性和可记忆性。我们展示了具有高互信息含量和低互信息含量的这类手势的例子。我们还展示了每个攻击者可以看到的信息,并描述了我们的系统如何抵抗这种攻击。
{"title":"Video: User-generated free-form gestures for authentication: security and memorability","authors":"Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, J. Lindqvist, Antti Oulasvirta, Teemu Roos","doi":"10.1145/2594368.2602429","DOIUrl":"https://doi.org/10.1145/2594368.2602429","url":null,"abstract":"This is a video demonstration for a full paper available in MobiSys'14 proceedings http://dx.doi.org/10.1145/2594368.2594375. The video demonstrates several forms of authentication on a common tablet, and compares them to our method for gesture-based authentication. Our method measures the security and memorability of user generated free-form gestures by estimating the mutual information of repeated gestures. We show examples of such gestures with high and low mutual information content. We also show what information from each is visible to a shoulder surfing attacker, and describe how our system is resistant to such an attack.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demo: Rio: a system solution for sharing I/O between mobile systems 演示:Rio:用于在移动系统之间共享I/O的系统解决方案
A. A. Sani, Kevin Boos, Minhong Yun, Lin Zhong
A user nowadays owns a variety of mobile systems, including smartphones, tablets, smart glasses, and smart watches, each equipped with a plethora of I/O devices, such as cameras, speakers, microphones, sensors, and cellular modems. There are many interesting use cases in which an application running on one mobile system accesses I/O on another system, for three fundamental reasons. (i) Mobile systems can be in different physical locations or orientations. For example, one can control a smartphone's high-resolution camera from a tablet camera application to more easily capture a self-portrait. (ii) Mobile systems can serve different users. For example, one can a play music for another user if one's smartphone can access the other device's speaker. (iii) Certain mobile systems have unique I/O devices due to their distinct form factor and targeted use cases. For example, a user can make a phone call from her tablet using the modem and SIM card in her smartphone. Solutions exist for sharing I/O devices, e.g., for camera [1], speaker [2], and modem (for messaging) [3]. However, these solutions have three limitations. (i) They do not support unmodified applications. (ii) They do not expose all the functionality of an I/O device for sharing. (iii) They are I/O class-specific, requiring significant engineering effort to support new I/O devices. We demonstrate Rio (Remote I/O), an I/O sharing solution for mobile systems that overcomes all three aforementioned limitations. Rio adopts a split-stack I/O sharing model, in which the I/O stack is split between the two mobile systems at a certain boundary. All communications that cross this boundary are intercepted on the mobile system hosting the application and forwarded to the mobile system with the I/O device, where they are served by the rest of the I/O stack. Rio uses device files as its boundary of choice. Device files are used in Unix-like OSes, such as Android and iOS, to abstract many classes of I/O devices, providing an I/O class-agnostic boundary. The device file boundary supports I/O sharing for unmodified applications, as it is transparent to the application layer. It also exposes the full functionality of each I/O device to other mobile systems by allowing processes in one system to directly communicate with the device drivers in another. Rio is not the first system to exploit the device file boundary; our previous work, Paradice [5], uses device files as the boundary for I/O virtualization inside a single system. However, Rio faces a different set of challenges regarding how to properly exploit this boundary, as explained in the full paper [6]. In this demo, we use a prototype implementation of Rio for Android systems. Our implementation supports four important I/O classes: camera, audio devices such as speaker and microphone, sensors such as accelerometer, and cellular modem (for phone calls and SMS). It consists of about 7100 lines of code, of which less than 500 are specific to I/O classes. Ri
现在,用户拥有各种各样的移动系统,包括智能手机、平板电脑、智能眼镜和智能手表,每个系统都配备了大量的I/O设备,如摄像头、扬声器、麦克风、传感器和蜂窝调制解调器。有许多有趣的用例,其中运行在一个移动系统上的应用程序访问另一个系统上的I/O,原因有三个。(i)移动系统可以在不同的物理位置或方向。例如,人们可以通过平板电脑相机应用程序控制智能手机的高分辨率相机,更轻松地拍摄自画像。移动系统可以为不同的用户服务。例如,如果一个人的智能手机可以访问另一个设备的扬声器,他就可以为另一个用户播放音乐。(iii)某些移动系统由于其独特的外形因素和目标用例而具有独特的I/O设备。例如,用户可以使用智能手机中的调制解调器和SIM卡在平板电脑上打电话。存在用于共享I/O设备的解决方案,例如用于相机[1]、扬声器[2]和调制解调器(用于消息传递)[3]。然而,这些解决方案有三个限制。它们不支持未经修改的应用程序。(ii)它们不公开I/O设备的所有功能以供共享。(iii)它们是特定于I/O类别的,需要大量的工程工作来支持新的I/O设备。我们将演示Rio(远程I/O),这是一种用于移动系统的I/O共享解决方案,它克服了上述所有三个限制。Rio采用split-stack I/O共享模型,将I/O堆栈在两个移动系统之间按一定边界进行分割。所有跨越这个边界的通信都在承载应用程序的移动系统上被拦截,并通过I/O设备转发到移动系统,在那里它们由I/O堆栈的其余部分提供服务。Rio使用设备文件作为其选择的边界。设备文件用于类unix操作系统,如Android和iOS,用于抽象I/O设备的许多类,提供与I/O类无关的边界。设备文件边界支持未修改应用程序的I/O共享,因为它对应用层是透明的。它还允许一个系统中的进程与另一个系统中的设备驱动程序直接通信,从而向其他移动系统公开每个I/O设备的全部功能。Rio并不是第一个利用设备文件边界的系统;我们之前的工作Paradice[5]使用设备文件作为单个系统内I/O虚拟化的边界。然而,正如全文所述[6],里约在如何正确利用这一边界方面面临着一系列不同的挑战。在这个演示中,我们使用了Rio在Android系统上的原型实现。我们的实现支持四种重要的I/O类:相机、音频设备(如扬声器和麦克风)、传感器(如加速度计)和蜂窝调制解调器(用于电话和短信)。它由大约7100行代码组成,其中不到500行是特定于I/O类的。Rio还支持异构移动系统(包括平板电脑和智能手机)之间的I/O共享。参见[4]的演示视频。
{"title":"Demo: Rio: a system solution for sharing I/O between mobile systems","authors":"A. A. Sani, Kevin Boos, Minhong Yun, Lin Zhong","doi":"10.1145/2594368.2601471","DOIUrl":"https://doi.org/10.1145/2594368.2601471","url":null,"abstract":"A user nowadays owns a variety of mobile systems, including smartphones, tablets, smart glasses, and smart watches, each equipped with a plethora of I/O devices, such as cameras, speakers, microphones, sensors, and cellular modems. There are many interesting use cases in which an application running on one mobile system accesses I/O on another system, for three fundamental reasons. (i) Mobile systems can be in different physical locations or orientations. For example, one can control a smartphone's high-resolution camera from a tablet camera application to more easily capture a self-portrait. (ii) Mobile systems can serve different users. For example, one can a play music for another user if one's smartphone can access the other device's speaker. (iii) Certain mobile systems have unique I/O devices due to their distinct form factor and targeted use cases. For example, a user can make a phone call from her tablet using the modem and SIM card in her smartphone. Solutions exist for sharing I/O devices, e.g., for camera [1], speaker [2], and modem (for messaging) [3]. However, these solutions have three limitations. (i) They do not support unmodified applications. (ii) They do not expose all the functionality of an I/O device for sharing. (iii) They are I/O class-specific, requiring significant engineering effort to support new I/O devices. We demonstrate Rio (Remote I/O), an I/O sharing solution for mobile systems that overcomes all three aforementioned limitations. Rio adopts a split-stack I/O sharing model, in which the I/O stack is split between the two mobile systems at a certain boundary. All communications that cross this boundary are intercepted on the mobile system hosting the application and forwarded to the mobile system with the I/O device, where they are served by the rest of the I/O stack. Rio uses device files as its boundary of choice. Device files are used in Unix-like OSes, such as Android and iOS, to abstract many classes of I/O devices, providing an I/O class-agnostic boundary. The device file boundary supports I/O sharing for unmodified applications, as it is transparent to the application layer. It also exposes the full functionality of each I/O device to other mobile systems by allowing processes in one system to directly communicate with the device drivers in another. Rio is not the first system to exploit the device file boundary; our previous work, Paradice [5], uses device files as the boundary for I/O virtualization inside a single system. However, Rio faces a different set of challenges regarding how to properly exploit this boundary, as explained in the full paper [6]. In this demo, we use a prototype implementation of Rio for Android systems. Our implementation supports four important I/O classes: camera, audio devices such as speaker and microphone, sensors such as accelerometer, and cellular modem (for phone calls and SMS). It consists of about 7100 lines of code, of which less than 500 are specific to I/O classes. Ri","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131326430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: DriveBlue: can bluetooth enhance your driving experience? 海报:DriveBlue:蓝牙能提升你的驾驶体验吗?
Ahmed Salem, T. Nadeem, M. Cetin
Bluetooth wide availability in vehicles either through passengers’ smartphones or vehicles hardware have been poorly exploited by researchers[2]. Neighbor Discovery is an exclusive Bluetooth [3] feature can be utilized to enhance transportation services while maintaining vehicle’s privacy. In this project, we advocate for using Bluetooth in developing intelligent transportation services. We name our project DriveBlue. Traffic incidents (e.g. congestion, accidents) are likely to affect drivers daily commute. So far solutions to such problems are based on statistical analysis. Bluetooth was used to estimate the travel time by extrapolating the period used to travel between two points [1]. In this project, we exploit Bluetooth neighbor discovery to detect traffic conditions (e.g. average road speed, differentiate between vehicles on regular lanes versus HOV) with receivers placed in a single site as in Fig. 1a. Features are extracted, and classified revealing some of the current traffic conditions.
通过乘客的智能手机或车辆硬件,蓝牙在车辆中的广泛可用性尚未得到研究人员b[2]的充分利用。邻居发现是蓝牙[3]独有的功能,可以用来增强交通服务,同时保持车辆的隐私。在这个项目中,我们提倡使用蓝牙技术来开发智能交通服务。我们将项目命名为DriveBlue。交通事故(例如挤塞、意外)可能会影响司机的日常通勤。到目前为止,这些问题的解决方案都是基于统计分析。蓝牙通过外推两点之间的时间来估计旅行时间。在这个项目中,我们利用蓝牙邻居发现来检测交通状况(例如,平均道路速度,区分常规车道上的车辆与HOV),接收器放置在单个站点,如图1a所示。特征被提取并分类,揭示了当前的一些交通状况。
{"title":"Poster: DriveBlue: can bluetooth enhance your driving experience?","authors":"Ahmed Salem, T. Nadeem, M. Cetin","doi":"10.1145/2594368.2601452","DOIUrl":"https://doi.org/10.1145/2594368.2601452","url":null,"abstract":"Bluetooth wide availability in vehicles either through passengers’ smartphones or vehicles hardware have been poorly exploited by researchers[2]. Neighbor Discovery is an exclusive Bluetooth [3] feature can be utilized to enhance transportation services while maintaining vehicle’s privacy. In this project, we advocate for using Bluetooth in developing intelligent transportation services. We name our project DriveBlue. Traffic incidents (e.g. congestion, accidents) are likely to affect drivers daily commute. So far solutions to such problems are based on statistical analysis. Bluetooth was used to estimate the travel time by extrapolating the period used to travel between two points [1]. In this project, we exploit Bluetooth neighbor discovery to detect traffic conditions (e.g. average road speed, differentiate between vehicles on regular lanes versus HOV) with receivers placed in a single site as in Fig. 1a. Features are extracted, and classified revealing some of the current traffic conditions.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115225608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COIN-GPS: indoor localization from direct GPS receiving COIN-GPS:通过直接GPS接收进行室内定位
S. Nirjon, Jie Liu, G. DeJean, B. Priyantha, Yuzhe Jin, Ted Hart
Due to poor signal strength, multipath effects, and limited on-device computation power, common GPS receivers do not work indoors. This work addresses these challenges by using a steerable, high-gain directional antenna as the front-end of a GPS receiver along with a robust signal processing step and a novel location estimation technique to achieve direct GPS-based indoor localization. By leveraging the computing power of the cloud, we accommodate longer signals for acquisition, and remove the requirement of decoding timestamps or ephemeris data from GPS signals. We have tested our system in 31 randomly chosen spots inside five single-story, indoor environments such as stores, warehouses and shopping centers. Our experiments show that the system is capable of obtaining location fixes from 20 of these spots with a median error of less than 10 m, where all normal GPS receivers fail.
由于信号强度差、多径效应和设备上计算能力有限,普通GPS接收机在室内无法工作。这项工作通过使用可操纵的高增益定向天线作为GPS接收器的前端,以及鲁棒的信号处理步骤和新颖的位置估计技术来实现直接基于GPS的室内定位,从而解决了这些挑战。通过利用云的计算能力,我们适应较长的信号进行采集,并消除了解码GPS信号的时间戳或星历数据的要求。我们在5个单层室内环境(如商店、仓库和购物中心)的31个随机地点测试了我们的系统。我们的实验表明,该系统能够从这些点中的20个获得定位固定,中值误差小于10米,而所有普通GPS接收器都失败了。
{"title":"COIN-GPS: indoor localization from direct GPS receiving","authors":"S. Nirjon, Jie Liu, G. DeJean, B. Priyantha, Yuzhe Jin, Ted Hart","doi":"10.1145/2594368.2594378","DOIUrl":"https://doi.org/10.1145/2594368.2594378","url":null,"abstract":"Due to poor signal strength, multipath effects, and limited on-device computation power, common GPS receivers do not work indoors. This work addresses these challenges by using a steerable, high-gain directional antenna as the front-end of a GPS receiver along with a robust signal processing step and a novel location estimation technique to achieve direct GPS-based indoor localization. By leveraging the computing power of the cloud, we accommodate longer signals for acquisition, and remove the requirement of decoding timestamps or ephemeris data from GPS signals. We have tested our system in 31 randomly chosen spots inside five single-story, indoor environments such as stores, warehouses and shopping centers. Our experiments show that the system is capable of obtaining location fixes from 20 of these spots with a median error of less than 10 m, where all normal GPS receivers fail.","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
期刊
Proceedings of the 12th annual international conference on Mobile systems, applications, and services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1