1. (In)secure Acoustic Mobile Authentication
- Author
-
Lili Zhang, Yanchao Zhang, Rui Zhang, Ang Li, Dianqi Han, Yan Zhang, Tao Li, and Jiawei Li
- Subjects
Authentication ,Computer Networks and Communications ,business.industry ,Microphone ,Computer science ,Data_MISCELLANEOUS ,Cognitive neuroscience of visual object recognition ,Mobile authentication ,Server ,Wireless ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Electrical and Electronic Engineering ,business ,Mobile device ,Software ,Computer network ,Vulnerability (computing) - Abstract
Acoustic fingerprinting aims to identify a mobile device based on its internal microphone(s) and speaker(s) which are unique due to manufacturing imperfection. This paper seeks a thorough understanding of the (in)security of exploring acoustic fingerprints for achieving distributed mobile authentication. Our contributions are threefold. First, we present a new acoustic fingerprint-emulation attack and demonstrate that it is a common vulnerability of acoustic mobile authentication systems. Second, we propose a dynamic challenge-response defense to secure acoustic mobile authentication systems against the acoustic fingerprint-emulation attack. Finally, we thoroughly investigate existing acoustic fingerprinting schemes and identify the best option for accurate, secure, and deployable acoustic mobile authentication systems.
- Published
- 2022