Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard

被引:3
|
作者
Hao, Zijiang [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23185 USA
关键词
D O I
10.1109/HotWeb.2016.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices have become our true companions in recent years. While bringing plenty of convenience, they also come with many security and privacy concerns. Being small, a mobile device is prone to loss or theft. Privacy data such as emails in a saved Gmail or Yahoo account on a lost device can be easily accessed by an unwanted visitor. Therefore, it is essential to research methods protecting mobile devices from any such unauthorized access. In this paper, we explore the potential of re-authenticating mobile device users by exploiting the biometrics derived from their tapping behaviors on the on-screen keyboard. We conduct an offline analysis on a dataset collected from 33 subjects using a Google Nexus S phone. The results show that more than 90% accuracy can be achieved for text input with 20 continuous key-taps.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [21] TouchID: User Authentication on Mobile Devices via Inertial-Touch Gesture Analysis
    Zhang, Xinchen
    Yin, Yafeng
    Xie, Lei
    Zhang, Hao
    Ge, Zefan
    Lu, Sanglu
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):
  • [22] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [23] Evaluation system for user authentication methods on mobile devices
    Progonov, Dmytro
    Prokhorchuk, Veronika
    Oliynyk, Andriy
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 95 - 101
  • [24] BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior
    Zhang, Chong
    Li, Songfan
    Song, Yihang
    Meng, Qianhe
    Lu, Li
    Hou, Mengshu
    SENSORS, 2022, 22 (09)
  • [25] User authentication on mobile devices: Approaches, threats and trends
    Wang, Chen
    Wang, Yan
    Chen, Yingying
    Liu, Hongbo
    Liu, Jian
    COMPUTER NETWORKS, 2020, 170
  • [26] Beyond the PIN: Enhancing user authentication for mobile devices
    Centre for Information Security and Network Research, University of Plymouth, Plymouth, United Kingdom
    Comput. Fraud Secur., 2008, 8 (12-17):
  • [27] Reconciling user privacy and implicit authentication for mobile devices
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    Safa, Nashad Ahmed
    COMPUTERS & SECURITY, 2015, 53 : 215 - 233
  • [28] Survey on NonObstructive and Continuous User Authentication on Mobile Devices
    Lalithamani, N.
    Balaji, Raam
    Dev, S. V. P. K. H. Satya
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [29] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [30] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191