{"id":11739,"date":"2017-03-14T07:57:40","date_gmt":"2017-03-14T07:57:40","guid":{"rendered":"http:\/\/revoscience.com\/en\/?p=11739"},"modified":"2017-03-14T07:57:40","modified_gmt":"2017-03-14T07:57:40","slug":"strengthening-cybersecurity-research","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/strengthening-cybersecurity-research\/","title":{"rendered":"Strengthening cybersecurity through research"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><em><strong>Singapore Management University\u2019s Secure Mobile Centre is tackling cybersecurity risks in mobile computing.<\/strong><\/em><\/span><\/p>\n<figure id=\"attachment_11740\" aria-describedby=\"caption-attachment-11740\" style=\"width: 270px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11740\" src=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-270x300.jpg\" alt=\"\" width=\"270\" height=\"300\" title=\"\" srcset=\"https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-270x300.jpg 270w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-768x853.jpg 768w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-922x1024.jpg 922w, https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg 1943w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><figcaption id=\"caption-attachment-11740\" class=\"wp-caption-text\">37889312 &#8211; 3d render image. smartphone with safe door and padlock. mobile security concept. isolated white background<\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Mobile computing has become a fundamental feature in modern day life as people develop an unprecedented reliance on smart phones and tablets. However, along with their ubiquity comes a host of risks that can affect personal privacy, sensitive corporate information and even national security. <\/span><\/p>\n<p><span style=\"color: #000000;\">Professor Robert Deng from the Singapore Management University (SMU) School of Information Systems (SIS) believes that current approaches to mobile computing security have been ineffective because they fail to consider differences between platforms and applications. <\/span><\/p>\n<p><span style=\"color: #000000;\">\u201cMobile devices are power- and resource-limited compared to desktop computers due to their smaller sizes. They are open to more channels such as mobile networks, Bluetooth, Wi-Fi and storage cards. They also have increased functionality due to their ability to download applications. The mobility, connectivity and extensibility of mobile devices mean they require targeted and efficient security solutions,\u201d says Deng, who is also the director of SMU\u2019s Secure Mobile Centre (SMC). <\/span><\/p>\n<p><span style=\"color: #000000;\">This calls for a new approach to security research in mobile computing, one that he and his colleagues at the SMC aim to develop. <\/span><\/p>\n<p><span style=\"color: #000000;\">One of the centre\u2019s many projects focuses on developing practical and secure solutions for sharing encrypted data in the cloud. <\/span><\/p>\n<p><span style=\"color: #000000;\">\u201cCloud data storage is becoming increasingly popular. However, since software systems are not guaranteed to be bug-free and hardware platforms are not under the direct control of data owners in the cloud, security risks are abundant. A common solution to mitigate users\u2019 privacy concerns is to encrypt their data before it reaches the cloud. This keeps the data private even if service provider systems are compromised or untrusted,\u201d says Deng.<\/span><\/p>\n<p><span style=\"color: #000000;\">However, he notes that it is extremely challenging to share large amounts of data that are encrypted using traditional techniques because of the difficulty in distributing decryption keys and managing decryption key revocations. For example, when people leave an organization, their decryption keys must be revoked so they can no longer access the organization\u2019s data. <\/span><\/p>\n<p><span style=\"color: #000000;\">The SMC has filed a patent on a new technique that will allow individuals and organizations to share encrypted data in the cloud in a scalable and efficient manner. This new technique allows efficient decryption on mobile devices and supports user revocation in real time. <\/span><\/p>\n<p><span style=\"color: #000000;\">Another project, headed by Dr Li Yingjiu, focuses on designing secure and usable authentication systems for mobile users. <\/span><\/p>\n<p><span style=\"color: #000000;\">Mobile platforms that authenticate the face of a legitimate user are an attractive alternative to passwords, which are often difficult to remember. However, most face- authentication systems currently in use are intrinsically vulnerable to forgery by means of photos or videos of the legitimate user. <\/span><\/p>\n<p><span style=\"color: #000000;\">To overcome this problem, researchers at the SMC have developed FaceLive, a system that can differentiate between a photograph or video of a user and a \u2018live\u2019 one. FaceLive corroborates facial video information with live motion data from the mobile device to verify an actual live feed from the user. It uses a front-facing camera, an accelerometer and a gyroscope to detect three-dimensional characteristics of a live user\u2019s face. <\/span><\/p>\n<p><span style=\"color: #000000;\">FaceLive simply requires users to hold and move their mobile device in front of their face while the front-facing camera captures a video of their face and the sensors simultaneously record motion data about their device. A live user is authenticated if changes in head movement in the video are consistent with movements captured by the device. <\/span><\/p>\n<p><span style=\"color: #000000;\">Like most systems, FaceLive could be vulnerable to sophisticated attacks, but the system is an improvement on current face-detection software. \u201cOur technique significantly raises the bar for adversaries to perform attacks,\u201d says Li.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Singapore Management University\u2019s Secure Mobile Centre is tackling cybersecurity risks in mobile computing. Mobile computing has become a fundamental feature in modern day life as people develop an unprecedented reliance on smart phones and tablets. However, along with their ubiquity comes a host of risks that can affect personal privacy, sensitive corporate information and even [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11740,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,22,17],"tags":[],"class_list":["post-11739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-other","category-research"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",1943,2159,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-270x300.jpg",270,300,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-768x853.jpg",750,833,true],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1-922x1024.jpg",750,833,true],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",1382,1536,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",1843,2048,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",720,800,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",513,570,false],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",600,667,false],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",540,600,false],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",441,490,false],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",324,360,false],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",58,65,false],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",640,711,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",86,96,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2017\/03\/4329-1.jpg",150,167,false]},"author_info":{"info":["Amrita Tuladhar"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/computer-science\/\" rel=\"category tag\">Computer Science<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/other\/\" rel=\"category tag\">Other<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/research\/\" rel=\"category tag\">Research<\/a>","tag_info":"Research","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/11739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=11739"}],"version-history":[{"count":0,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/11739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/11740"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=11739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=11739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=11739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}