Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla
Computer Vision Syndrome (CVS) is a common problem in the "Information Age", and it is becoming more serious as mobile devices (e.g. smartphones and tablet PCs) with small, low-resolution screens are outnumbering the home computers. The simplest way to avoid CVS is to blink frequently. However, most people do not realize that they blink less and some do not blink at all in front of the screen. In this paper, we present a mobile application that keeps track of the reader's blink rate and prods the user to blink if an exceptionally low blink rate is detected. The proposed eye detection and tracking algorithm is designed for mobile devices and can keep track of the eyes in spite of camera motion. The main idea is to predict the eye position in the camera frame using the feedback from the built-in accelerometer. The eye tracking system was built on a commercial Tablet PC. The experimental results consistently show that the scheme can withstand very aggressive mobility scenarios.
{"title":"EyeGuardian: a framework of eye tracking and blink detection for mobile device users","authors":"Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla","doi":"10.1145/2162081.2162090","DOIUrl":"https://doi.org/10.1145/2162081.2162090","url":null,"abstract":"Computer Vision Syndrome (CVS) is a common problem in the \"Information Age\", and it is becoming more serious as mobile devices (e.g. smartphones and tablet PCs) with small, low-resolution screens are outnumbering the home computers. The simplest way to avoid CVS is to blink frequently. However, most people do not realize that they blink less and some do not blink at all in front of the screen. In this paper, we present a mobile application that keeps track of the reader's blink rate and prods the user to blink if an exceptionally low blink rate is detected. The proposed eye detection and tracking algorithm is designed for mobile devices and can keep track of the eyes in spite of camera motion. The main idea is to predict the eye position in the camera frame using the feedback from the built-in accelerometer. The eye tracking system was built on a commercial Tablet PC. The experimental results consistently show that the scheme can withstand very aggressive mobility scenarios.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76774702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We argue that there are several potential uses of replay that are especially beneficial when applied to mobile phones: dual execution on cloud or cloudlet computers to reduce latency and possibly phone energy use, operation shipping for file synchronization, and offloading of expensive security and reliability checks to remote servers. In this paper, we explore these potential uses, as well as some of the unique challenges posed by implementing replay on phones.
{"title":"Can deterministic replay be an enabling tool for mobile computing?","authors":"J. Flinn, Z. Morley Mao","doi":"10.1145/2184489.2184507","DOIUrl":"https://doi.org/10.1145/2184489.2184507","url":null,"abstract":"Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We argue that there are several potential uses of replay that are especially beneficial when applied to mobile phones: dual execution on cloud or cloudlet computers to reduce latency and possibly phone energy use, operation shipping for file synchronization, and offloading of expensive security and reliability checks to remote servers. In this paper, we explore these potential uses, as well as some of the unique challenges posed by implementing replay on phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"84-89"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88313836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song
As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this paper, we present AdNext, a visit-pattern-aware mobile advertising system for urban commercial complexes. AdNext can provide highly relevant ads to users by predicting places that the users will next visit. AdNext predicts the next visit place by learning the sequential visit patterns of commercial complex users in a collective manner. As one of the key enabling techniques for AdNext, we develop a probabilistic prediction model that predicts users' next visit place from their place visit history. To automatically collect the users' place visit history by smartphones, we utilize Wi-Fi-based indoor localization. We demonstrate the feasibility of AdNext by evaluating the accuracy of the prediction model. For the evaluation, we used a dataset collected from COEX Mall, the largest commercial complex in South Korea. Also, we implemented an initial prototype of AdNext with the latest smartphones, and deployed it in COEX Mall.
{"title":"AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes","authors":"Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song","doi":"10.1145/2184489.2184492","DOIUrl":"https://doi.org/10.1145/2184489.2184492","url":null,"abstract":"As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this paper, we present AdNext, a visit-pattern-aware mobile advertising system for urban commercial complexes. AdNext can provide highly relevant ads to users by predicting places that the users will next visit. AdNext predicts the next visit place by learning the sequential visit patterns of commercial complex users in a collective manner. As one of the key enabling techniques for AdNext, we develop a probabilistic prediction model that predicts users' next visit place from their place visit history. To automatically collect the users' place visit history by smartphones, we utilize Wi-Fi-based indoor localization. We demonstrate the feasibility of AdNext by evaluating the accuracy of the prediction model. For the evaluation, we used a dataset collected from COEX Mall, the largest commercial complex in South Korea. Also, we implemented an initial prototype of AdNext with the latest smartphones, and deployed it in COEX Mall.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81994050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent results show that several of these systems are, in fact, not end-to-end secure. In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users. We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.
{"title":"Towards end-to-end security in branchless banking","authors":"S. Panjwani","doi":"10.1145/2184489.2184496","DOIUrl":"https://doi.org/10.1145/2184489.2184496","url":null,"abstract":"Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent results show that several of these systems are, in fact, not end-to-end secure.\u0000 In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users. We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"28-33"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83242537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik
Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by the presence of regional words, abbreviations and idioms. We have tested the feasibility of applying Bayesian learning and Support Vector Machine(SVM) based machine learning techniques which were reported to be most effective in email spam filtering on a India centric dataset. In our ongoing research, as an exploratory step, we have developed a mobile-based system SMSAssassin that can filter SMS spam messages based on bayesian learning and sender blacklisting mechanism. Since the spam SMS keywords and patterns keep on changing, SMSAssassin uses crowd sourcing to keep itself updated. Using a dataset that we are collecting from users in the real-world, we evaluated our approaches and found some interesting results.
{"title":"SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering","authors":"Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik","doi":"10.1145/2184489.2184491","DOIUrl":"https://doi.org/10.1145/2184489.2184491","url":null,"abstract":"Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by the presence of regional words, abbreviations and idioms. We have tested the feasibility of applying Bayesian learning and Support Vector Machine(SVM) based machine learning techniques which were reported to be most effective in email spam filtering on a India centric dataset. In our ongoing research, as an exploratory step, we have developed a mobile-based system SMSAssassin that can filter SMS spam messages based on bayesian learning and sender blacklisting mechanism. Since the spam SMS keywords and patterns keep on changing, SMSAssassin uses crowd sourcing to keep itself updated. Using a dataset that we are collecting from users in the real-world, we evaluated our approaches and found some interesting results.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"84 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86206356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.
{"title":"Mobile token-based authentication on a budget","authors":"Hristo Bojinov, D. Boneh","doi":"10.1145/2184489.2184494","DOIUrl":"https://doi.org/10.1145/2184489.2184494","url":null,"abstract":"We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 1","pages":"14-19"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85698283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.
{"title":"FollowMe: enhancing mobile applications with open infrastructure sensing","authors":"Ben Greenstein, B. Longstaff","doi":"10.1145/2184489.2184511","DOIUrl":"https://doi.org/10.1145/2184489.2184511","url":null,"abstract":"Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"104 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76028343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twenty-three popular applications from the Android Market.
{"title":"MockDroid: trading privacy for application functionality on smartphones","authors":"A. Beresford, A. Rice, Nicholas Skehin, R. Sohan","doi":"10.1145/2184489.2184500","DOIUrl":"https://doi.org/10.1145/2184489.2184500","url":null,"abstract":"MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twenty-three popular applications from the Android Market.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"108 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79207505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall
As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.
{"title":"Sensor tricorder: what does that sensor know about me?","authors":"Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall","doi":"10.1145/2184489.2184510","DOIUrl":"https://doi.org/10.1145/2184489.2184510","url":null,"abstract":"As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"98-103"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82453118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal
A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of mobile mashups, they fail to address a very important issue of handling security and privacy considerations of a mobile user. In this paper, we characterize the nature of access control required for utilizing device features in a mashup setting; design a security and privacy middleware based on the well known XACML policy language; and describe how the middleware enables a user to easily control usage of device features. Implementation-wise, we realize our middleware on Android platform (but easily generalizable to other platforms), integrate it with an existing mashup framework, and demonstrate its utility through an e-commerce mobile mashup.
{"title":"User controllable security and privacy for mobile mashups","authors":"Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal","doi":"10.1145/2184489.2184498","DOIUrl":"https://doi.org/10.1145/2184489.2184498","url":null,"abstract":"A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of mobile mashups, they fail to address a very important issue of handling security and privacy considerations of a mobile user. In this paper, we characterize the nature of access control required for utilizing device features in a mashup setting; design a security and privacy middleware based on the well known XACML policy language; and describe how the middleware enables a user to easily control usage of device features. Implementation-wise, we realize our middleware on Android platform (but easily generalizable to other platforms), integrate it with an existing mashup framework, and demonstrate its utility through an e-commerce mobile mashup.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"25 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80191251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}