Know your enemy: The risk of unauthorized access in smartphones by insiders

Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, Konstantin Beznosov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

51 Citations (Scopus)

Abstract

Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this paper, we report the results of a study investigating users' concerns about unauthorized data access on their smartphones (22 interviewed and 724 surveyed subjects). We found that users are generally concerned about insiders (e.g., friends) accessing their data on smartphones. Furthermore, we present the first evidence that the insider threat is a real problem impacting smartphone users. In particular, 12% of subjects reported a negative experience with unauthorized access. We also found that younger users are at higher risk of experiencing unauthorized access. Based on our results, we propose a stronger adversarial model that incorporates the insider threat. To better reflect users' concerns and risks, a stronger adversarial model must be considered during the design and evaluation of data protection systems and authentication methods for smartphones.

Original languageEnglish
Title of host publicationMobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services
Pages271-280
Number of pages10
DOIs
Publication statusPublished - 16 Sep 2013
Event15th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2013 - Munich, Germany
Duration: 27 Aug 201330 Aug 2013

Publication series

NameMobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services

Other

Other15th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2013
CountryGermany
CityMunich
Period27/8/1330/8/13

    Fingerprint

Keywords

  • insider
  • loss
  • physical threats
  • smartphone
  • stranger
  • theft
  • user study

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Software

Cite this

Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. (2013). Know your enemy: The risk of unauthorized access in smartphones by insiders. In MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (pp. 271-280). (MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services). https://doi.org/10.1145/2493190.2493223