论文标题
窥探器上的侦探:记录作为对移动设备物理攻击的安全响应
Snooping on Snoopers: Logging as a Security Response to Physical Attacks on Mobile Devices
论文作者
论文摘要
当用户无人看管的移动设备或让其他人瞬间使用它们时,他们容易泄露隐私。现有的技术防御措施,例如解锁身份验证或帐户切换,已被证明是不受欢迎的。我们进行了访谈,以发现目前参与威胁的用户的实践,发现用户通常会始终将其设备始终在密切的监督下进行密切监督。这种策略的一个障碍是表现出这种保护行为可能对社会关系有害。为了解决这些问题,我们构建了一个软件工具,该工具收集活动在后台登录。以后可以将日志作为打开的应用程序的时间表进行审查和每个内部执行的操作,并以与前置摄像头不明显地捕获的图片装饰。我们在用户研究中评估了这种方法,并发现参与者通常以不同的方式采用该技术。大多数用户预见到它是一种威慑力量,或者检查是否会遇到这种怀疑。然而,有些人表达了创建“蜂蜜陷阱”的目的。结果突出了伐木方法的机会和潜在危险。
When users leave their mobile devices unattended, or let others use them momentarily, they are susceptible to privacy breaches. Existing technological defenses, such as unlock authentication or account switching, have proven to be unpopular. We conducted interviews to uncover practices users currently engage in to cope with the threat, and found that it is common for users to try to keep their devices under close supervision at all times. One obstacle to this strategy is that displaying such protective behavior can be detrimental to social relationships. To address these concerns, we built a software tool that gathers activity logs in the background. Logs can later be reviewed as a timeline of opened apps and the actions performed within each, with events decorated with pictures captured inconspicuously with the front-facing camera. We evaluated this approach in a user study, and found participants to be generally eager to adopt the technology, although in different ways. Most users foresaw using it as a deterrent, or to check if they were snooped on, if that suspicion were ever to arise. Yet, some voiced the intention of creating "honey traps". The results highlight both the opportunities and the potential dangers of the logging approach.