Publications

DialerAuth: A Motion-assisted Touch-based Smartphone User Authentication Scheme
[21/Mar/2018]

This paper introduces DialerAuth - a mechanism which leverages the way a smartphone user taps/enters any “text-independent" 10-digit number (replicating the dialing process) and the hand’s micro-movements she makes while doing so. DialerAuth authenticates the user on the basis of timing differences in the entered 10-digit strokes. DialerAuth provides enhanced security by leveraging the transparent and unobservable layer based on another

Authors: 
Attaullah Buriro
Bruno Crispo
Filippo Del Frari
Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)

Improving MQTT by Inclusion of Usage Control
[11/Dec/2017]

Due to the increasing pervasiveness of Internet of Things (IoT) and Internet of Everything (IoE) devices, securing both their communications and operations has become of capital importance. Among the several existing IoT protocols, Message Queue Telemetry Transport (MQTT) is a widely-used general purpose one, usable in both constrained and powerful devices, which coordinates data exchanges through a publish/subscribe approach. In this paper, we propose a methodology to increase the security of the MQTT protocol, by including Usage Control in its operative workflow.

Authors: 
Antonio La Marra
Fabio Martinelli
Paolo Mori
Athanasios Rizos
Andrea Saracino
Author (ESR): 
Athanasios Rizos (Consiglio Nazionale Delle Ricerche)

Mobile Biometrics: Towards A Comprehensive Evaluation Methodology
[23/Oct/2017]

Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism.

Authors: 
Attaullah Buriro
Zahid Akhtar
Bruno Crispo
Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)

Pages