Mostrar el registro sencillo del ítem
Smartphones as Practical and Secure Location Verification Tokens for Payments
| dc.contributor.author | Marforio, Claudio | |
| dc.contributor.author | Karapanos, Nikolaos | |
| dc.contributor.author | Soriente, Claudio | |
| dc.contributor.author | Kostiainen, Kari | |
| dc.contributor.author | Capkun, Srdjan | |
| dc.date.accessioned | 2025-01-10T16:59:47Z | |
| dc.date.available | 2025-01-10T16:59:47Z | |
| dc.date.issued | 2014 | |
| dc.identifier.citation | Marforio, C., Karapanos, N., Soriente, C., Kostiainen, K., & Capkun, S. (2014, February). Smartphones as Practical and Secure Location Verification Tokens for Payments. In NDSS (Vol. 14, pp. 23-26). https://doi.org/10.14722/ndss.2014.23165 | es |
| dc.identifier.other | https://www.ndss-symposium.org/ndss2014/ndss-2014-programme/smartphones-practical-and-secure-location-verification-tokens-payments/ | es |
| dc.identifier.uri | http://hdl.handle.net/20.500.12020/1458 | |
| dc.description.abstract | We propose a novel location-based second-factor authentication solution for modern smartphones. We demonstrate our solution in the context of point of sale transactions and show how it can be effectively used for the detection of fraudulent transactions caused by card theft or counterfeiting. Our scheme makes use of Trusted Execution Environments (TEEs), such as ARM TrustZone, commonly available on modern smartphones, and resists strong attackers, even those capable of compromising the victim phone applications and OS. It does not require any changes in the user behavior at the point of sale or to the deployed terminals. In particular, we show that practical deployment of smartphone-based second-factor authentication requires a secure enrollment phase that binds the user to his smartphone TEE and allows convenient device migration. We then propose two novel enrollment schemes that resist targeted attacks and provide easy migration. We implement our solution within available platforms and show that it is indeed realizable, can be deployed with small software changes, and does not hinder user experience. | es |
| dc.language.iso | en | es |
| dc.publisher | Internet Society | es |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Smartphones as Practical and Secure Location Verification Tokens for Payments | es |
| dc.type | conferenceObject | es |
| dc.identifier.conferenceObject | Network and Distributed System Security Symposium, 23-26 de febrero 2014, San Diego EEUU | es |
| dc.identifier.doi | https://doi.org/10.14722/ndss.2014.23165 | |
| dc.rights.accessRights | openAccess | es |
| dc.subject.area | Ingenierías | es |
| dc.subject.keyword | Trusted Execution Environments | es |
| dc.subject.keyword | Mobile Payments | es |
| dc.subject.keyword | Security | es |
| dc.subject.unesco | 33 Ciencias Tecnológicas | es |




