Skip to main content

Showing 1–6 of 6 results for author: Klingensmith, N

.
  1. arXiv:2403.14018  [pdf, other

    cs.CR

    A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things

    Authors: Isaac Ahlgren, Jack West, Kyuin Lee, George Thiruvathukal, Neil Klingensmith

    Abstract: Zero Involvement Pairing and Authentication (ZIPA) is a promising technique for autoprovisioning large networks of Internet-of-Things (IoT) devices. In this work, we present the first successful signal injection attack on a ZIPA system. Most existing ZIPA systems assume there is a negligible amount of influence from the unsecured outside space on the secured inside space. In reality, environmental… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  2. arXiv:2311.04433  [pdf, other

    cs.CR

    SyncBleed: A Realistic Threat Model and Mitigation Strategy for Zero-Involvement Pairing and Authentication (ZIPA)

    Authors: Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Zero Involvement Pairing and Authentication (ZIPA) is a promising technique for auto-provisioning large networks of Internet-of-Things (IoT) devices. Presently, these networks use password-based authentication, which is difficult to scale to more than a handful of devices. To deal with this challenge, ZIPA enabled devices autonomously extract identical authentication or encryption keys from ambien… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  3. arXiv:2207.11767  [pdf, other

    cs.SE

    Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics

    Authors: Nicholas Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal

    Abstract: Software metrics capture information about software development processes and products. These metrics support decision-making, e.g., in team management or dependency selection. However, existing metrics tools measure only a snapshot of a software project. Little attention has been given to enabling engineers to reason about metric trends over time -- longitudinal metrics that give insight about pr… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: Accepted at ASE 2022 Tool Demonstrations

  4. arXiv:2204.06128  [pdf, other

    cs.CR

    Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

    Authors: Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz

    Abstract: Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device's video camera is carefully c… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  5. arXiv:2104.14618  [pdf, other

    cs.CR

    Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

    Authors: Jack West, Kyuin Lee, Suman Banerjee, Younghyun Kim, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Context-based authentication is a method for transparently validating another device's legitimacy to join a network based on location. Devices can pair with one another by continuously harvesting environmental noise to generate a random key with no user involvement. However, there are gaps in our understanding of the theoretical limitations of environmental noise harvesting, making it difficult fo… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 16 pages, 5 figures, IPSN 2021

  6. arXiv:2004.00092  [pdf, other

    eess.SP cs.CR

    VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

    Authors: Jack West, Tien VoNguyen, Isaac Ahlgren, Iryna Motyashok, George K. Thiruvathukal, Neil Klingensmith

    Abstract: We present VoltKey, a method that transparently generates secret keys for colocated devices, leveraging spatiotemporally unique noise contexts observed in commercial power line infrastructure. VoltKey extracts randomness from power line noise and securely converts it into an authentication token. Nearby devices which observe the same noise patterns on the powerline generate identical keys. The uni… ▽ More

    Submitted 31 March, 2020; originally announced April 2020.

    Comments: Tools Demo: Accepted at Information Processing in Sensor Networks 2020