Snooping on Snoopers: Logging as a Security Response to Physical Attacks on Mobile Devices

08/25/2022
by   Tiago Guerreiro, et al.
0

When users leave their mobile devices unattended, or let others use them momentarily, they are susceptible to privacy breaches. Existing technological defenses, such as unlock authentication or account switching, have proven to be unpopular. We conducted interviews to uncover practices users currently engage in to cope with the threat, and found that it is common for users to try to keep their devices under close supervision at all times. One obstacle to this strategy is that displaying such protective behavior can be detrimental to social relationships. To address these concerns, we built a software tool that gathers activity logs in the background. Logs can later be reviewed as a timeline of opened apps and the actions performed within each, with events decorated with pictures captured inconspicuously with the front-facing camera. We evaluated this approach in a user study, and found participants to be generally eager to adopt the technology, although in different ways. Most users foresaw using it as a deterrent, or to check if they were snooped on, if that suspicion were ever to arise. Yet, some voiced the intention of creating "honey traps". The results highlight both the opportunities and the potential dangers of the logging approach.

READ FULL TEXT
research
01/31/2020

A Tool for Conducting User Studies on Mobile Devices

With the ever-growing interest in the area of mobile information retriev...
research
04/06/2021

Logging Practices with Mobile Analytics: An Empirical Study on Firebase

Software logs are of great value in both industrial and open-source proj...
research
02/16/2016

Deep Feature-based Face Detection on Mobile Devices

We propose a deep feature-based face detector for mobile devices to dete...
research
08/19/2020

Exposures Exposed: A Measurement and User Study to Assess Mobile Data Privacy in Context

Mobile devices have access to personal, potentially sensitive data, and ...
research
06/28/2021

Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments

App builders commonly use security challenges, a form of step-up authent...
research
04/07/2016

Aware: Controlling App Access to I/O Devices on Mobile Platforms

Smartphones' cameras, microphones, and device displays enable users to c...
research
04/30/2019

Characterizing Pairs Collaboration in a Mobile-equipped Shared-Wall Display Supported Collaborative Setup

Recent advancements in mobile devices encourage researchers to utilize t...

Please sign up or login with your details

Forgot password? Click here to reset