user authentication for
play

User Authentication for Emerging Interfaces Nasir Memon Tandon - PowerPoint PPT Presentation

User Authentication for Emerging Interfaces Nasir Memon Tandon School of Engineering New York University Identity Identity and Authentication What is identity? A computers representation of an unique entity (principal). What is


  1. User Authentication for Emerging Interfaces Nasir Memon Tandon School of Engineering New York University

  2. Identity

  3. Identity and Authentication • What is identity? – A computer’s representation of an unique entity (principal). • What is authentication? – Binding principal to system ’ s internal representation of identity. • Why do we need identity? – Accountability – Access control

  4. Authenticating Computers and Humans

  5. SOMETHING YOU ARE - Biometrics

  6. Shoulder surfing or Insiders Usability

  7. What You Know

  8. Guessing Passwords

  9. RAINBOW TABLES ??

  10. Recent Leaks

  11. Password policies

  12. Password are hard to replace

  13. Why?? Usability  Memorywise Effortless  Scalable for users  Nothing-to-Carry  Physically-Effortless  Easy-to-Learn  Efficient-to-Use  Infrequent-Errors  Easy-Recovery-from-Loss Bonneau, Herley, Oorschot and Stajano 14

  14. Why?? Security  Resilient-to-Physical-Observation  Resilient-to-Targeted-Impersonation  Resilient-to-Throttled-Guessing  Resilient-to-Unthrottled-Guessing  Resilient-to-Internal-Observation  Resilient-to-Leaks-from-Other-Verifiers  Resilient-to-Phishing  Resilient-to-Theft  No-Trusted-Third-Party  Requiring-Explicit-Consent  Unlinkable 15

  15. Why?? Deployability  Accessible  Negligible-Cost-per-User  Server compatible  Browser compatible  Mature 16

  16. But it is not due to lack of trying …

  17. Google’s attempt …

  18. And academics and startups …

  19. Game Changer? - Emerging Interfaces

  20. Emerging Interfaces

  21. Emerging Interfaces

  22. Emerging Interfaces

  23. Game Changer - Mobility

  24. Continuous Authentication

  25. Different Approaches

  26. Evaluation - Security • Random Guessing • False positives • Shoulder surfing • Insider threat • Replay attack

  27. Evaluation - Usability • Memorability • True positives • Efficiency • Satisfaction • Universality

  28. Touch interface

  29. Android Pattern Lock – Recall Based

  30. Windows 8 Picture Password

  31. Single Finger Touch – Online Signatures

  32. • What is this about? Single Finger Touch – Draw-a-PIN 9/30/2016 33

  33. Touch motion

  34. Multi-touch gestures

  35. Camera interface

  36. Face Recognition

  37. Authentication with body gestures Database Access point 𝑍 𝑊 Similar? 𝑎 Slide courtesy of Konrad and Easwar

  38. Hand Gestures

  39. Eye Gaze SSIP 2009 40

  40. Camera and Private Display

  41. Motion Sensor

  42. Motion Sensors

  43. Leap Motion Gestures

  44. Leap Motion Sensor

  45. Waving a device

  46. Head Banger!

  47. Electroencephalograph - EEG • Brain has continuous electrical activity that can be recorded • Pairs of electrodes attached to scalp form distinct channels • Weak signal ~millivolts is sent thru amplifier • Continuous output recorded via galvanometer.

  48. NeuroSky Mindset

  49. Summary

  50. Summary

  51. Summary

  52. Also - Fingerprint Sensors

  53. Partial Fingerprints

  54. Master Prints

  55. Thank you!! Questions? memon@nyu.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend