Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
  • Program
    • At a Glance
    • Symposium Program
    • 2nd Workshop on Security Information Workers
    • Who Are You?! Adventures in Authentication
    • Workshop on Privacy Indicators
    • Workshop on Security Fatigue
    • Workshop on the Future of Privacy Notices and Indicators: Will Drones Deliver My Privacy Policy?
  • Activities
    • Poster Session
    • Birds-of-a-Feather Sessions
  • Sponsorship
  • Participate
    • Instructions for Authors and Speakers
    • Call for Nominations
    • Call for Papers
    • Call for Posters and Proposals
      • Call for Papers: 2nd Workshop on Security Information Workers
      • Call for Papers: Who are you?! Adventures in Authentication
      • Call for Papers: Workshop on Privacy Indicators
      • Call for Papers: Workshop on Security Fatigue
      • Workshop: Will Drones Deliver My Privacy Policy?
  • About
    • Organizers
    • Past Symposia

sponsors

Gold Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Industry Partner
  • Home
  • Attend
  • Program
  • Activities
  • Sponsorship
  • Participate
  • About

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Picking a (Smart)Lock: Locking Relationships on Mobile Devices
Tweet

connect with us

Picking a (Smart)Lock: Locking Relationships on Mobile Devices

Authors: 

Elizabeth Stobert and David Barrera, ETH Zürich

Abstract: 

The last decade has seen an explosion of mobile device deployment and adoption. As these devices take on a more central role in users' everyday lives, the security of these devices becomes paramount. In addition to providing access to data stored elsewhere, smartphones and tablets often store considerable personal data locally, increasing the importance of only allowing legitimate access to the device. Local authentication to the device is thus of central importance in a user's security management tasks.

The environmental requirements of mobile users fundamentally change the threat model and design requirements for device authentication from the traditional "desktop"paradigm. Mobile devices are used in a variety of physical environments, and are thus not protected by the physical security measures that protect desktop computers. Mobile devices are exposed to a wider variety of potential attackers, and do not benefit from the predictable environments enjoyed by home and office computers. This portability, combined with increased exposure to people and unknown environments, leads to higher susceptibility to theft and loss.

Elizabeth Stobert, ETH Zürich

David Barrera, ETH Zürich

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {197895,
author = {Elizabeth Stobert and David Barrera},
title = {Picking a ({{{{{Smart)Lock}}}}}: Locking Relationships on Mobile Devices},
booktitle = {Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
year = {2016},
address = {Denver, CO},
url = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/stobert},
publisher = {USENIX Association},
month = jun,
}
Download
Stobert PDF
View the Slides
  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us