skip to main content
10.1145/1620545.1620566acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

SessionMagnifier: a simple approach to secure and convenient kiosk browsing

Authors Info & Claims
Published:30 September 2009Publication History

ABSTRACT

Many people use public computers to browse the Web and perform important online activities. However, public computers are usually far less trustworthy than peoples' own computers because they are more vulnerable to various security attacks. In this paper, we propose SessionMagnifier, a simple approach to secure and convenient kiosk browsing. The key idea of SessionMagnifier is to enable an extended browser on a mobile device and a regular browser on a public computer to collaboratively support a Web session. This approach simply requires a SessionMagnifier browser extension to be installed on a trusted mobile device. A user can securely perform sensitive interactions on the mobile device and conveniently perform other browsing interactions on the public computer. We implemented SessionMagnifier for Mozilla's Fennec browser and evaluated it on a Nokia N810 Internet Tablet. Our evaluation and analysis demonstrate that SessionMagnifier is simple, secure, and usable.

References

  1. D. Balfanz and E.W. Felten. Hand-held computers can be better smart cards. In Proc. of the USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Chiasson, P. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In Proc. of the USENIX Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D.E. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. L. Rivest. The untrusted computer problem and camera-based authentication. In Proc. of the Pervasive Computing, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Florencio and C. Herley. Klassp: Entering passwords on a spyware infected machine using a shared-secret proxy. In Proc. of the ACSAC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Trustworthy and personalized computing on public kiosks. In Proc. of the MobiSys, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R.C. Jammalamadaka, T.W. van der Horst, S. Mehrotra, K.E. Seamons, and N. Venkasubramanian. Delegate: A proxy based architecture for secure website access from an untrusted machine. In Proc. of the ACSAC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Mannan and P.C. van Oorschot. Using a personal device to strengthen password authentication from an untrusted computer. In Proc. of the Financial Cryptography, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N.B. Margolin, M. Wright, and B.N. Levine. Guardian: A framework for privacy control in untrusted environments. Technical Report, University of Massachusetts, Amherst, 2004.Google ScholarGoogle Scholar
  9. J.M. McCune, A. Perrig, and M.K. Reiter. Bump in the ether: a framework for securing sensitive user input. In Proc. of the USENIX Annual Technical Conference, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Oprea, D. Balfanz, G. Durfee, and D.K. Smetters. Securing a remote terminal application with a mobile trusted device. In Proc. of the ACSAC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Parno, C. Kuo, and A. Perrig. Phoolproof phishing prevention. In Proc. of the Financial Cryptography, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Richardson, Q. Stafford-Fraser, K.R. Wood, and A. Hopper. Virtual network computing. IEEE Internet Computing, 2(1):33--38, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S.J. Ross, J.L. Hill, M.Y. Chen, A.D. Joseph, D.E. Culler, and E.A. Brewer. A composable framework for secure multi-modal access to internet services from post-pc devices. Mob. Netw. Appl., 7(5):389--406, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Sharp, A. Madhavapeddy, R. Want, and T. Pering. Enhancing web browsing security on public terminals using mobile composition. In Proceeding of the MobiSys, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Sharp, J. Scott, and A.R. Beresford. Secure mobile computing via public terminals. In Proc. of the Pervasive Computing, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Want, T. Pering, G. Danneels, M. Kumar, M. Sundar, and J. Light. The personal server: Changing the way we think about ubiquitous computing. In Proc. of the Ubicomp, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Wu, S. Garfinkel, and R. Miller. Secure web authentication with mobile phones. In Proc. of the DIMACS Workshop on Usable Privacy and Security Software, 2004.Google ScholarGoogle Scholar
  18. https://developer.mozilla.org/en/Extensions.Google ScholarGoogle Scholar
  19. http://msdn.microsoft.com/en-us/library/aa753587(VS.85).aspx.Google ScholarGoogle Scholar
  20. http://en.wikipedia.org/wiki/Ajax\_(programming).Google ScholarGoogle Scholar
  21. http://en.wikipedia.org/wiki/Likert\_scale.Google ScholarGoogle Scholar
  22. 5 safety tips for using a public computer. http://www.microsoft.com/protect/yourself/mobile/publicpc.mspx.Google ScholarGoogle Scholar
  23. Fennec. https://wiki.mozilla.org/Fennec.Google ScholarGoogle Scholar

Index Terms

  1. SessionMagnifier: a simple approach to secure and convenient kiosk browsing

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                UbiComp '09: Proceedings of the 11th international conference on Ubiquitous computing
                September 2009
                292 pages
                ISBN:9781605584317
                DOI:10.1145/1620545

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 30 September 2009

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                UbiComp '09 Paper Acceptance Rate31of251submissions,12%Overall Acceptance Rate764of2,912submissions,26%

                Upcoming Conference

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader