{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:36:12Z","timestamp":1725784572483},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2145278"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656113","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"185-195","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["UWB-Auth: A UWB-based Two Factor Authentication Platform"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2279-9047","authenticated-orcid":false,"given":"Yifeng","family":"Cao","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6272-8521","authenticated-orcid":false,"given":"Ashutosh","family":"Dhekne","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2803-300X","authenticated-orcid":false,"given":"Mostafa","family":"Ammar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adafruit fingerprint sensor. https:\/\/www.adafruit.com\/product\/4750."},{"key":"e_1_3_2_1_2_1","unstructured":"Airtag. https:\/\/www.apple.com\/airtag\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple watch. https:\/\/www.apple.com\/watch\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Current mfa fatigue attack campaign targeting microsoft office 365 users. https:\/\/www.gosecure.net\/blog\/2022\/02\/14\/current-mfa-fatigue-attackcampaign- targeting-microsoft-office-365-users\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Dealing with phantom mfa challenges in microsoft 365. https:\/\/duo.com\/blog\/ mfa-fatigue-what-is-it-how-to-respond."},{"key":"e_1_3_2_1_6_1","unstructured":"Duo mobile app. https:\/\/duo.com\/product\/multi-factor-authentication-mfa\/duomobile- app."},{"key":"e_1_3_2_1_7_1","unstructured":"Ergonomic monitor positioning. https:\/\/workerscomp.nm.gov\/sites\/default\/files\/ documents\/publications\/Ergonomics\/Info_Ergonomics_Computer_Monitor_ Positioning.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Fido2. https:\/\/fidoalliance.org\/fido2\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Google 2-step verification. https:\/\/safety.google\/authentication\/."},{"key":"e_1_3_2_1_10_1","unstructured":"How does phishing work? https:\/\/www.yubico.com\/resources\/phishing\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Mfa fatigue: What it is and how to respond. https:\/\/duo.com\/blog\/mfa-fatiguewhat- is-it-how-to-respond."},{"key":"e_1_3_2_1_12_1","unstructured":"Nearby interaction with uwb. https:\/\/developer.apple.com\/nearby-interaction\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Onlykey. https:\/\/www.samsung.com\/us\/smartphones\/galaxy-z-flip5\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Oura. https:\/\/www.ouraring.com."},{"key":"e_1_3_2_1_15_1","unstructured":"Phishing attack on cisco. https:\/\/www.cybersecuritydive.com\/news\/ciscophishing- attack\/629442\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Qorvo dw1000 chip. https:\/\/store.qorvo.com\/products\/detail\/dw1000itr13-qorvo\/ 681945\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Rsa securid. https:\/\/www.rsa.com\/products\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Samsung uwb."},{"key":"e_1_3_2_1_19_1","unstructured":"Signicat. https:\/\/www.signicat.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Yubikey. https:\/\/www.yubico.com\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ieee standard for low-rate wireless networks. IEEE Std 802.15.4--2015 (Revision of IEEE Std 802.15.4--2011) pages 1--709 2016.","DOI":"10.1109\/TITB.2011.2166649"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCO.2013.6718286"},{"key":"e_1_3_2_1_23_1","unstructured":"Lawrence Abrams. Phishing attack on uber. https:\/\/tinyurl.com\/34r7muz7."},{"key":"e_1_3_2_1_24_1","volume-title":"Signature verification using a\" siamese\" time delay neural network. Advances in neural information processing systems, 6","author":"Bromley Jane","year":"1993","unstructured":"Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S\u00e4ckinger, and Roopak Shah. Signature verification using a\" siamese\" time delay neural network. Advances in neural information processing systems, 6, 1993."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467885"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN54987.2022.9918119"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382240"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167996.3167997"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_30_1","first-page":"751","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Dhekne Ashutosh","year":"2019","unstructured":"Ashutosh Dhekne, Ayon Chakraborty, Karthikeyan Sundaresan, and Sampath Rangarajan. {TrackIO}: Tracking first responders {Inside-Out}. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pages 751--764, 2019."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210345"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310389"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453084"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"e_1_3_2_1_38_1","first-page":"483","volume-title":"24th USENIX security symposium (USENIX security 15)","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. {Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound. In 24th USENIX security symposium (USENIX security 15), pages 483--498, 2015."},{"key":"e_1_3_2_1_39_1","volume-title":"Shoulder surfing attack in graphical password authentication. arXiv preprint arXiv:0912.0951","author":"Lashkari Arash Habibi","year":"2009","unstructured":"Arash Habibi Lashkari, Samaneh Farmand, Dr Zakaria, Omar Bin, Dr Saleh, et al. Shoulder surfing attack in graphical password authentication. arXiv preprint arXiv:0912.0951, 2009."},{"key":"e_1_3_2_1_40_1","volume-title":"November 26","author":"McLaughlin Michael","year":"2019","unstructured":"Michael McLaughlin and Billy Verso. Asymmetric double-sided two-way ranging in an ultrawideband communication system, November 26 2019. US Patent 10,488,509."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2018.00013"},{"key":"e_1_3_2_1_43_1","unstructured":"Leena Rao. Paypal debuts its biometrics and smartwatch integrations with samsung. https:\/\/techcrunch.com\/2014\/04\/11\/paypal-debuts-its-biometrics-andsmartwatch- integrations-with-samsung\/."},{"key":"e_1_3_2_1_44_1","volume-title":"19th USENIX Security Symposium (USENIX Security 10)","author":"Rasmussen Kasper Bonne","year":"2010","unstructured":"Kasper Bonne Rasmussen and Srdjan Capkun. Realization of {RF} distance bounding. In 19th USENIX Security Symposium (USENIX Security 10), 2010."},{"key":"e_1_3_2_1_45_1","first-page":"357","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pages 357--370, 2019."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3232172"},{"key":"e_1_3_2_1_47_1","volume-title":"March 14","author":"Rosati Anthony","year":"2017","unstructured":"Anthony Rosati. Two factor authentication using near field communications, March 14 2017. US Patent 9,594,896."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323404"},{"key":"e_1_3_2_1_51_1","volume-title":"Visualizing data using t-sne. Journal of machine learning research, 9(11)","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(11), 2008."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313093"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483258"},{"key":"e_1_3_2_1_55_1","volume-title":"Canonical time warping for alignment of human behavior. Advances in neural information processing systems, 22","author":"Zhou Feng","year":"2009","unstructured":"Feng Zhou and Fernando Torre. Canonical time warping for alignment of human behavior. Advances in neural information processing systems, 22, 2009."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576842.3582382"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:25:55Z","timestamp":1719483955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":56,"alternative-id":["10.1145\/3643833.3656113","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656113","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}