Continuous Implicit Authentication through Touch Traces Modelling

被引:10
作者
Karanikiotis, Thomas [1 ]
Papamichail, Michail D. [1 ]
Chatzidimitriou, Kyriakos C. [1 ]
Oikonomou, Napoleon-Christos, I [1 ]
Symeonidis, Andreas L. [1 ]
Saripalle, Sashi K. [2 ]
机构
[1] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, Thessaloniki, Greece
[2] ZOLOZ, Kansas City, MO 64108 USA
来源
2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020) | 2020年
关键词
Implicit Authentication; Smartphone Security; Touch Traces Modelling; Support Vector Machines;
D O I
10.1109/QRS51102.2020.00026
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit authentication on the basis of behavioral biometrics. In this work, we propose a methodology towards continuous implicit authentication that refrains from the limitations imposed by small-scale and/or controlled environment experiments by employing a real-world application used widely by a large number of individuals. Upon constructing our models using Support Vector Machines, we introduce a confidence-based methodology, in order to strengthen the effectiveness and the efficiency of our approach. The evaluation of our methodology on a set of diverse scenarios indicates that our approach achieves good results both in terms of efficiency and usability.
引用
收藏
页码:111 / 120
页数:10
相关论文
共 25 条
[1]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[2]  
[Anonymous], 2014, authentication via touch biometrics: An experimental study on smartphones, P187
[3]  
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI 10.1145/2335356.2335358
[4]  
De Luca A., 2012, C HUM FACT COMP SYST
[5]  
Derawi M. O., 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), P306, DOI 10.1109/IIHMSP.2010.83
[6]   Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors [J].
Egelman, Serge ;
Jain, Sakshi ;
Portnoff, Rebecca S. ;
Liao, Kerwell ;
Consolvo, Sunny ;
Wagner, David .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :750-761
[7]  
Feng T., 2014, TIPS CONTEXT AWARE I
[8]  
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891
[9]   Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication [J].
Frank, Mario ;
Biedert, Ralf ;
Ma, Eugene ;
Martinovic, Ivan ;
Song, Dawn .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :136-148
[10]  
Frontera-Pons J, 2012, IEEE IMAGE PROC, P113, DOI 10.1109/ICIP.2012.6466808