Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard

被引:3
|
作者
Hao, Zijiang [1 ]
Li, Qun [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23185 USA
关键词
D O I
10.1109/HotWeb.2016.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices have become our true companions in recent years. While bringing plenty of convenience, they also come with many security and privacy concerns. Being small, a mobile device is prone to loss or theft. Privacy data such as emails in a saved Gmail or Yahoo account on a lost device can be easily accessed by an unwanted visitor. Therefore, it is essential to research methods protecting mobile devices from any such unauthorized access. In this paper, we explore the potential of re-authenticating mobile device users by exploiting the biometrics derived from their tapping behaviors on the on-screen keyboard. We conduct an offline analysis on a dataset collected from 33 subjects using a Google Nexus S phone. The results show that more than 90% accuracy can be achieved for text input with 20 continuous key-taps.
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [31] An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices
    Buduru, Arun Balaji
    Yau, Stephen S.
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 219 - 226
  • [32] Towards authentication using mobile devices An investigation of the prerequisites
    Weippl, E
    Essmayr, W
    Gruber, F
    Stockner, W
    Trenker, T
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 91 - 105
  • [33] Towards a user identification framework for mobile devices
    Brawerman, Alessandro
    Pessoa Albini, Luiz Carlos
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 272 - +
  • [34] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [35] Breaking two remote user authentication systems for mobile devices
    Li, Wenting
    Gu, Qianchen
    Zhao, Yiming
    Wang, Ping
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 37 - 42
  • [36] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [37] Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Devices
    Oishi, Shintaro
    Ichino, Masatsugu
    Yoshiura, Hiroshi
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 428 - 429
  • [38] Breaking Three Remote user Authentication Systems for Mobile Devices
    Li, Wenting
    Shen, Yaosheng
    Wang, Ping
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2018, 90 (8-9): : 1179 - 1190
  • [39] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [40] Breaking Three Remote user Authentication Systems for Mobile Devices
    Wenting Li
    Yaosheng Shen
    Ping Wang
    Journal of Signal Processing Systems, 2018, 90 : 1179 - 1190