Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Dartmouth's new ZEBRA bracelet strengthens computer security
by Staff Writers
Hanover NH (SPX) Sep 29, 2014


File image.

In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

Dartmouth's Trustworthy Health and Wellness (THaW)/ researchers recently presented their findings at the IEEE Symposium on Security and Privacy.

Common authentication methods based on passwords, tokens or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. But users often do not log out, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals.

One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are insufficient: they confirm whether the user is nearby but not whether the user is actually using the terminal. Other proposed solutions based on behavioral biometrics (e.g., keystroke dynamics) may not be reliable, as a recent study suggests.

To address this problem, Shrirang Mare, a Dartmouth computer science Ph.D. student, developed an approach called Zero-Effort Bilateral Recurring Authentication, or ZEBRA. In ZEBRA, a user wears a bracelet with a built-in accelerometer, gyroscope and radio on his or her dominant wrist; such bracelets are commonly sold as fitness devices.

When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user via keyboard and mouse and confirms the continued presence of the user only if they correlate.

Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same - the user's hand movement.

In experiments, ZEBRA performed continuous authentication with 85 percent accuracy in verifying the correct user and identified all adversaries within 11 seconds. For a different threshold that trades security for usability, ZEBRA correctly verified 90 percent of users and identified all adversaries within 50 seconds.

Thus, ZEBRA can recognize (in under a minute) when an unauthorized person steps in to use the terminal if the original user has stepped away from the terminal.

This kind of quick reaction can prevent mistakes - such as clinical staff accidentally entering information into the wrong patient's medical record - or inappropriate behavior, such as a bystander examining personal medical information or financial data by taking advantage of a computer left open by an authorized user.

"In this work, we focused on the deauthentication problem for desktop computers because we were motivated by associated problems faced by healthcare professionals in hospitals," says the study's senior author Professor David Kotz.

"It would be natural to extend ZEBRA to mobile devices, such as smartphones or tablet computers, and we believe this is possible despite some different challenges."

In principle, ZEBRA could also be extended to other devices such as TV remotes, game controllers or medical devices - any device where the user provides frequent inputs with his or her hand. For these devices, however, the application may be more for improving usability than security.

For example, if the TV remote could identify who is holding it, it could provide personalized functionality, which could lead to a better user experience. Identifying who is using a particular medical device or sensor could help provide a secure user-attestation that is useful for healthcare professionals.

.


Related Links
Dartmouth College
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US tops information requests in latest Yahoo report
San Francisco (AFP) Sept 25, 2014
A Yahoo transparency report released Thursday showed that the United States topped the list of countries demanding information about users in the first half of this year. The United States called on the California-based Internet veteran to disclose data from accounts of 12,533 users, compared with the 4,759 accounts targeted by second-place Taiwan, according to the report. Data was only ... read more


CYBER WARS
Russia to Launch Full-Scale Moon Exploration Next Decade

Lunar explorers will walk at higher speeds than thought

Year's final supermoon is a Harvest Moon

China Aims for the Moon, Plans to Bring Back Lunar Soil

CYBER WARS
India's Mars Orbiter Cost Only 11 Percent of NASA's Maven Probe: Reports

India's spacecraft beams back first Mars photos

NASA Rover Drill Pulls First Taste From Mars Mountain

Back to Driving

CYBER WARS
NASA technologies to be studied for commercialization

NASA Seeks Best and Brightest for Space Technology Fellowships

Midland International Receives FAA Spaceport License Approval

Japanese Firm Plans Space Elevator to Run by 2050

CYBER WARS
China's first space lab in operation for over 1000 days

China Exclusive: Mars: China's next goal?

Astronauts eye China's future space station

China eyes working with other nations as station plans develop

CYBER WARS
A Giant Among Earth Satellites

New ISS Trio Launches to Expand Expedition 41 to Six

SpaceX cargo ship arrives at International Space Station

Halfway through Blue Dot mission

CYBER WARS
Arianespace's lightweight Vega launcher is readied for its mission with the European IXV spaceplane

Soyuz Rocket Awaiting Launch at Baikonur Cosmodrome

Elon Musk, Rick Perry attend groundbreaking for Texas spaceport

France raises heat on decision for next Ariane rocket

CYBER WARS
New milestone in the search for water on distant planets

Clear skies on exo-Neptune

Distant planet's atmosphere shows evidence of water vapor

Chandra Finds Planet That Makes Star Act Deceptively Old

CYBER WARS
France taps Thales for radar antenna research project

Fed Up With Federal Inaction, States Act Alone on Cap-and-Trade

Microsoft to tap $2-trillion Indian cloud market

How to make stronger, 'greener' cement




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.