Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard

被引:3
|
作者
Hao, Zijiang [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23185 USA
关键词
D O I
10.1109/HotWeb.2016.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices have become our true companions in recent years. While bringing plenty of convenience, they also come with many security and privacy concerns. Being small, a mobile device is prone to loss or theft. Privacy data such as emails in a saved Gmail or Yahoo account on a lost device can be easily accessed by an unwanted visitor. Therefore, it is essential to research methods protecting mobile devices from any such unauthorized access. In this paper, we explore the potential of re-authenticating mobile device users by exploiting the biometrics derived from their tapping behaviors on the on-screen keyboard. We conduct an offline analysis on a dataset collected from 33 subjects using a Google Nexus S phone. The results show that more than 90% accuracy can be achieved for text input with 20 continuous key-taps.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [1] Implicit User Re-authentication for Mobile Devices
    Yazji, Sausan
    Chen, Xi
    Dick, Robert P.
    Scheuermann, Peter
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 325 - +
  • [2] Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP)
    Chrabaszcz, Rafal
    Pacyna, Piotr
    2012 15TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2012,
  • [3] Biometric re-authentication: an approach towards achieving transparency in user authentication
    Kakali Neha
    Multimedia Tools and Applications, 2019, 78 : 6679 - 6700
  • [4] Biometric re-authentication: an approach towards achieving transparency in user authentication
    Neha
    Chatterjee, Kakali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (06) : 6679 - 6700
  • [5] DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps
    Amini, Sara
    Noroozi, Vahid
    Pande, Amit
    Gupte, Satyajit
    Yu, Philip S.
    Kanich, Chris
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 2027 - 2035
  • [6] A Novel Approach to Design of User Re-Authentication Systems
    Jagadeesan, Harini
    Hsiao, Michael S.
    2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 379 - 384
  • [7] Towards Multiple User Active Authentication in Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 354 - 361
  • [8] RADTEC: Re-authentication of IoT Devices with Machine Learning
    Gupta, Kaustubh
    Ghose, Nirnimesh
    Wang, Boyang
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [9] A Multi-factor Re-authentication Framework with User Privacy
    Uluagac, A. Selcuk
    Liu, Wenyi
    Beyah, Raheem
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 504 - 505
  • [10] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58