LatentGesture: Active User Authentication through Background Touch Analysis

被引:30
作者
Saravanan, Premkumar [1 ]
Clarke, Samuel [1 ]
Chau, Duen Horng [1 ]
Zha, Hongyuan [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
来源
PROCEEDINGS OF CHINESE CHI 2014: SECOND INTERNATIONAL SYMPOSIUM OF CHINESE CHI (CHINESE CHI 2014) | 2014年
关键词
Active authentication; touch gestures; shoulder surfing; fraudulent transactions; classification model;
D O I
10.1145/2592235.2592252
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach for authenticating users of mobile devices that is based on analyzing the user's touch interaction with common user interface (UI) elements, e.g., buttons, checkboxes and sliders. Unlike one-off authentication techniques such as passwords or gestures, our technique works continuously in the background while the user uses the mobile device. To evaluate our approach's effectiveness, we conducted a lab study with 20 participants, where we recorded their interaction traces on a mobile phone and a tablet (e.g., touch pressure, locations), while they filled out electronic forms populated with UI widgets. Using classification methods based on SVM and Random Forests, we achieved an average of 97.9% accuracy with a mobile phone and 96.79% accuracy with a tablet for single user classification, demonstrating that our technique has strong potential for real-world use. We believe our research can help strengthen personal device security and safeguard against unintended or unauthorized uses, such as small children in a household making unauthorized online transactions on their parents' devices, or an impostor accessing the bank account belonging to the victim of a stolen device.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 11 条
  • [1] [Anonymous], 2004, P 13 C USENIX SEC S
  • [2] Acceptance of subscriber authentication methods for mobile telephony devices
    Clarke, NL
    Furnell, SM
    Rodwell, PM
    Reynolds, PL
    [J]. COMPUTERS & SECURITY, 2002, 21 (03) : 220 - 228
  • [3] De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
  • [4] FRANK M, 2013, SYSTEMS MAN CYBERN A, V8, P136, DOI DOI 10.1109/TIFS.2012.2225048
  • [5] Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
  • [6] Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    Khan, Muhammad Khurram
    Zhang, Jiashu
    Wang, Xiaomin
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 35 (03) : 519 - 524
  • [7] Kim D, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1093
  • [8] uWave: Accelerometer-based personalized gesture recognition and its applications
    Liu, Jiayang
    Zhong, Lin
    Wickramasuriya, Jehan
    Vasudevan, Venu
    [J]. PERVASIVE AND MOBILE COMPUTING, 2009, 5 (06) : 657 - 675
  • [9] Rosenblatt S, 2013, TOUCH ID HACK VERIFI, V9
  • [10] Sae-Bae N., 2012, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, P977, DOI DOI 10.1145/2207676.2208543