Visible to the public SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals

TitleSoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Publication TypeConference Paper
Year of Publication2018
AuthorsWang, M., Zhu, W., Yan, S., Wang, Q.
Conference Name2018 IEEE Conference on Communications and Network Security (CNS)
Date Publishedmay
PublisherIEEE
ISBN Number978-1-5386-4586-4
Keywordsambient audio signals, ambient sound, audio signals, authentication, authorisation, browser, Browsers, challenge-response protocol, co-presence detection, Human Behavior, human factors, learning (artificial intelligence), machine learning, online front-ends, password, pubcrawl, Servers, smart phone, smart phones, SoundAuth, support vector machine, Support vector machines, time synchronization, Two factor Authentication, user experience, user-friendliness, zero-effort 2FA mechanism, zero-effort two-factor authentication
Abstract

Two-factor authentication (2FA) popularly works by verifying something the user knows (a password) and something she possesses (a token, popularly instantiated with a smart phone). Conventional 2FA systems require extra interaction like typing a verification code, which is not very user-friendly. For improved user experience, recent work aims at zero-effort 2FA, in which a smart phone placed close to a computer (where the user enters her username/password into a browser to log into a server) automatically assists with the authentication. To prove her possession of the smart phone, the user needs to prove the phone is on the login spot, which reduces zero-effort 2FA to co-presence detection. In this paper, we propose SoundAuth, a secure zero-effort 2FA mechanism based on (two kinds of) ambient audio signals. SoundAuth looks for signs of proximity by having the browser and the smart phone compare both their surrounding sounds and certain unpredictable near-ultrasounds; if significant distinguishability is found, SoundAuth rejects the login request. For the ambient signals comparison, we regard it as a classification problem and employ a machine learning technique to analyze the audio signals. Experiments with real login attempts show that SoundAuth not only is comparable to existent schemes concerning utility, but also outperforms them in terms of resilience to attacks. SoundAuth can be easily deployed as it is readily supported by most smart phones and major browsers.

URLhttps://ieeexplore.ieee.org/document/8433202
DOI10.1109/CNS.2018.8433202
Citation Keywang_soundauth:_2018