Papers by Jean Pierre Tello

Secure authentication for smartphones is becoming important for many applications such as financi... more Secure authentication for smartphones is becoming important for many applications such as financial transactions. Until today PIN and password authentication are the most commonly used methods for smartphone access control. Specifically for a PIN and limited length passwords, the level of security is low and thus can be compromised easily. In this work, we propose a multi-modal biometric system, which uses face, periocular and iris biometric characteristics for authentication. The proposed system is tested on two different devices -Samsung Galaxy S5 smartphone and Samsung Galaxy Note 10.1 tablet. An extensive set of experiments conducted using the proposed system shows the applicability for secure authentication scenarios. The proposed system is tested using uni-modal and multi-modal approach. An Equal Error Rate (EER) of 0.68% is obtained from the experiments validating the robust performance of the proposed system.

Nowadays, mobile devices are an important part of our everyday lives since they enable us to acce... more Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.
Uploads
Papers by Jean Pierre Tello