LatentGesture: Active User Authentication through Background Touch Analysis

被引:30
作者
Saravanan, Premkumar [1 ]
Clarke, Samuel [1 ]
Chau, Duen Horng [1 ]
Zha, Hongyuan [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
来源
PROCEEDINGS OF CHINESE CHI 2014: SECOND INTERNATIONAL SYMPOSIUM OF CHINESE CHI (CHINESE CHI 2014) | 2014年
关键词
Active authentication; touch gestures; shoulder surfing; fraudulent transactions; classification model;
D O I
10.1145/2592235.2592252
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new approach for authenticating users of mobile devices that is based on analyzing the user's touch interaction with common user interface (UI) elements, e.g., buttons, checkboxes and sliders. Unlike one-off authentication techniques such as passwords or gestures, our technique works continuously in the background while the user uses the mobile device. To evaluate our approach's effectiveness, we conducted a lab study with 20 participants, where we recorded their interaction traces on a mobile phone and a tablet (e.g., touch pressure, locations), while they filled out electronic forms populated with UI widgets. Using classification methods based on SVM and Random Forests, we achieved an average of 97.9% accuracy with a mobile phone and 96.79% accuracy with a tablet for single user classification, demonstrating that our technique has strong potential for real-world use. We believe our research can help strengthen personal device security and safeguard against unintended or unauthorized uses, such as small children in a household making unauthorized online transactions on their parents' devices, or an impostor accessing the bank account belonging to the victim of a stolen device.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 11 条
[1]  
[Anonymous], 2004, P 13 C USENIX SEC S
[2]   Acceptance of subscriber authentication methods for mobile telephony devices [J].
Clarke, NL ;
Furnell, SM ;
Rodwell, PM ;
Reynolds, PL .
COMPUTERS & SECURITY, 2002, 21 (03) :220-228
[3]  
De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
[4]  
FRANK M, 2013, SYSTEMS MAN CYBERN A, V8, P136, DOI DOI 10.1109/TIFS.2012.2225048
[5]  
Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
[6]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524
[7]  
Kim D, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1093
[8]   uWave: Accelerometer-based personalized gesture recognition and its applications [J].
Liu, Jiayang ;
Zhong, Lin ;
Wickramasuriya, Jehan ;
Vasudevan, Venu .
PERVASIVE AND MOBILE COMPUTING, 2009, 5 (06) :657-675
[9]  
Rosenblatt S, 2013, TOUCH ID HACK VERIFI, V9
[10]  
Sae-Bae N., 2012, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, P977, DOI DOI 10.1145/2207676.2208543