Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard

被引:3
|
作者
Hao, Zijiang [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23185 USA
关键词
D O I
10.1109/HotWeb.2016.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices have become our true companions in recent years. While bringing plenty of convenience, they also come with many security and privacy concerns. Being small, a mobile device is prone to loss or theft. Privacy data such as emails in a saved Gmail or Yahoo account on a lost device can be easily accessed by an unwanted visitor. Therefore, it is essential to research methods protecting mobile devices from any such unauthorized access. In this paper, we explore the potential of re-authenticating mobile device users by exploiting the biometrics derived from their tapping behaviors on the on-screen keyboard. We conduct an offline analysis on a dataset collected from 33 subjects using a Google Nexus S phone. The results show that more than 90% accuracy can be achieved for text input with 20 continuous key-taps.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [11] A Fast Iterative Localized Re-authentication Protocol for Heterogeneous Mobile Networks
    Lin, Shen-Ho
    Chiu, Jung-Hui
    Lee, Gwo-Ruey
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (04) : 2267 - 2275
  • [12] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [13] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [14] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [15] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [16] Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns
    Zhang, Xiaomei
    Zhang, Pengming
    Hu, Haomin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [17] Towards Pupil-Assisted Target Selection in Natural Settings: Introducing an On-Screen Keyboard
    Strauch, Christoph
    Greiter, Lukas
    Huckauf, Anke
    HUMAN-COMPUTER INTERACTION - INTERACT 2017, PT III, 2017, 10515 : 534 - 543
  • [18] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [19] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [20] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,