Skip to main content

Defending against device theft with human notarization

Publication ,  Conference
Libonati, A; Caine, K; Kapadia, A; Reiter, MK
Published in: CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
January 1, 2015

People increasingly rely on mobile phones for storing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk-once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is hard to defend by purely local means. We introduce the concept of 'notarization', a process by which a remote notary verifies the identity of the device user through video chat. We describe the design and implementation of a system that leverages notarization to protect cryptographic keys that the device uses to decrypt device data (e.g., website passwords) or perform signatures in support of client-side TLS, without trusting the notary with these keys. Through a lab-based study with 56 participants, we show that notarization even by strangers is effective for combating device theft.

Duke Scholars

Published In

CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing

DOI

Publication Date

January 1, 2015

Start / End Page

8 / 17
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Libonati, A., Caine, K., Kapadia, A., & Reiter, M. K. (2015). Defending against device theft with human notarization. In CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (pp. 8–17). https://doi.org/10.4108/icst.collaboratecom.2014.257649
Libonati, A., K. Caine, A. Kapadia, and M. K. Reiter. “Defending against device theft with human notarization.” In CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 8–17, 2015. https://doi.org/10.4108/icst.collaboratecom.2014.257649.
Libonati A, Caine K, Kapadia A, Reiter MK. Defending against device theft with human notarization. In: CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2015. p. 8–17.
Libonati, A., et al. “Defending against device theft with human notarization.” CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2015, pp. 8–17. Scopus, doi:10.4108/icst.collaboratecom.2014.257649.
Libonati A, Caine K, Kapadia A, Reiter MK. Defending against device theft with human notarization. CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2015. p. 8–17.

Published In

CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing

DOI

Publication Date

January 1, 2015

Start / End Page

8 / 17