Skip to main content

2014 | OriginalPaper | Buchkapitel

Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security

verfasst von : Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, J. Alex Halderman

Erschienen in: Financial Cryptography and Data Security

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many companies have recently started to offer wearable computing devices including glasses, bracelets, and watches. While this technology enables exciting new applications, it also poses new security and privacy concerns. In this work, we explore these implications and analyze the impact of one of the first networked wearable devices—smartwatches—on an academic environment. As a proof of concept, we develop an application for the Pebble smartwatch called ConTest that would allow dishonest students to inconspicuously collaborate on multiple-choice exams in real time, using a cloud-based service, a smartphone, and a client application on a smartwatch. We discuss the broader implications of this technology, suggest hardware and software approaches that can be used to prevent such attacks, and pose questions for future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Cizek, G.J.: Cheating on Tests: How to Do It, Detect It, and Prevent It. Routledge, New York (1999) Cizek, G.J.: Cheating on Tests: How to Do It, Detect It, and Prevent It. Routledge, New York (1999)
4.
Zurück zum Zitat Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, Ubicomp ’09, pp. 105–114 (2009) Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, Ubicomp ’09, pp. 105–114 (2009)
7.
Zurück zum Zitat Frary, R.B., Tideman, T.N., Watts, T.M.: Indices of cheating on multiple-choice tests. J. Educ. Behav. Stat. 2(4), 235–256 (1977)CrossRef Frary, R.B., Tideman, T.N., Watts, T.M.: Indices of cheating on multiple-choice tests. J. Educ. Behav. Stat. 2(4), 235–256 (1977)CrossRef
9.
Zurück zum Zitat Halderman, J.A., Waters, B., Felten, E.W.: Privacy management for portable recording devices. In: Proceedings of the Workshop on Privacy in the Electronic Society, pp. 16–24 (2004) Halderman, J.A., Waters, B., Felten, E.W.: Privacy management for portable recording devices. In: Proceedings of the Workshop on Privacy in the Electronic Society, pp. 16–24 (2004)
10.
Zurück zum Zitat Harpp, D.N., Hogan, J.J.: Crime in the classroom: detection and prevention of cheating on multiple-choice exams. J. Chem. Educ. 70, 4 (1993)CrossRef Harpp, D.N., Hogan, J.J.: Crime in the classroom: detection and prevention of cheating on multiple-choice exams. J. Chem. Educ. 70, 4 (1993)CrossRef
11.
Zurück zum Zitat Hochet, B., Acosta, A.J., Bellido, M.J. (eds.): PATMOS 2002. LNCS, vol. 2451. Springer, Heidelberg (2002)MATH Hochet, B., Acosta, A.J., Bellido, M.J. (eds.): PATMOS 2002. LNCS, vol. 2451. Springer, Heidelberg (2002)MATH
12.
Zurück zum Zitat Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM (2004) Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM (2004)
13.
Zurück zum Zitat Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. Computer 34, 12 (2001)CrossRef Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. Computer 34, 12 (2001)CrossRef
14.
Zurück zum Zitat Langheinrich, M.: Privacy by design–principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)CrossRef Langheinrich, M.: Privacy by design–principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)CrossRef
16.
Zurück zum Zitat Narayanaswami, C., Kamijoh, N., Raghunath, M., Inoue, T., Cipolla, T., Sanford, J., Schlig, E., Venkiteswaran, S., Guniguntala, D., Kulkarni, V.: IBM’s Linux watch, the challenge of miniaturization. Computer 35(1), 33–41 (2002)CrossRef Narayanaswami, C., Kamijoh, N., Raghunath, M., Inoue, T., Cipolla, T., Sanford, J., Schlig, E., Venkiteswaran, S., Guniguntala, D., Kulkarni, V.: IBM’s Linux watch, the challenge of miniaturization. Computer 35(1), 33–41 (2002)CrossRef
18.
Zurück zum Zitat Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T., et al.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: Usenix Security, vol. 3, p. 3 (2007) Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T., et al.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: Usenix Security, vol. 3, p. 3 (2007)
Metadaten
Titel
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security
verfasst von
Alex Migicovsky
Zakir Durumeric
Jeff Ringenberg
J. Alex Halderman
Copyright-Jahr
2014
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-45472-5_7

Premium Partner