[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3243734.3278488acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

A Guided Approach to Behavioral Authentication

Published: 15 October 2018 Publication History

Abstract

User's behavioral biometrics are promising as authentication factors in particular if accuracy is sufficiently guaranteed. They can be used to augment security in combination with other authentication factors. A gesture-based pattern lock system is a good example of such multi-factor authentication, using touch dynamics in a smartphone. However, touch dynamics can be significantly affected by a shape of gestures with regard to the performance and accuracy, and our concern is that user-chosen patterns are likely far from producing such a good shape of gestures. In this poster, we raise this problem and show our experimental study conducted in this regard. We investigate if there is a reproducible correlation between shape and accuracy and if we can derive effective attribute values for user guidance, based on the gesture-based pattern lock system. In more general, we discuss a guided approach to behavioral authentication.

References

[1]
Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In Proc. the 4th USENIX Conference on Offensive Technologies (WOOT '10). USENIX Association, Berkeley, CA, USA, 1--7. http://dl.acm.org/citation.cfm?id=1925004.1925009
[2]
Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch Me Once and I Know It's You!: Implicit Authentication Based on Touch Screen Patterns. In Proc. the Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 987--996.
[3]
IH Jermyn, Alain Mayer, Fabian Monrose, Michael K Reiter, and Aviel D Rubin. 1999. The Design and Analysis of Graphical Passwords. In Proc. the 8th USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 1--1. http://dl.acm.org/citation.cfm?id=1251421.1251422
[4]
Muhammad Shahzad, Alex X Liu, and Arjmand Samuel. 2013. Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures: You Can See It but You Can Not Do It. In Proc. the 19th Annual International Conference on Mobile Computing & Networking (MobiCom '13). ACM, New York, NY, USA, 39--50.
[5]
Zdeňka Sitová, Jaroslav Seděnka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S Balagani. 2016. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Trans. on Information Forensics and Security 11, 5 (May 2016), 877--892.
[6]
Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, and Jun Ho Huh. 2015. On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks. In Proc. the Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2343--2352.
[7]
Hai Tao and Carlisle Adams. 2008. Pass-go: A Proposal to Improve the Usability of Graphical Passwords. IJ Network Security 7, 2 (Sep. 2008), 273--292.
[8]
Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. 2016. A Survey on Touch Dynamics Authentication in Mobile Devices. Computers & Security 59 (Jun. 2016), 210-- 235.
[9]
Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz.2013. Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns. In Proc. the Conference on Computer and Communications Security (CCS '13). ACM, New York, NY, USA, 161--172.
[10]
Emanuel Von Zezschwitz, Alexander De Luca, Philipp Janssen, and Heinrich Hussmann. 2015. Easy to Draw, but Hard to Trace?: On the Observability of Gridbased (Un)lock Patterns. In Proc. the Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 2339--2342.
[11]
Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang. 2017. Cracking Android Pattern Lock in Five Attempts. In Proc. the Network and Distributed System Security Symposium (NDSS '17). Internet Society, Reston VA.

Cited By

View all
  • (2021)Authentication Mechanisms and Classification: A Literature SurveyIntelligent Computing10.1007/978-3-030-80129-8_69(1051-1070)Online publication date: 6-Jul-2021
  • (2020)Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based DevicesIntelligent and Cloud Computing10.1007/978-981-15-5971-6_29(263-273)Online publication date: 31-Oct-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
October 2018
2359 pages
ISBN:9781450356930
DOI:10.1145/3243734
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2018

Check for updates

Author Tags

  1. authentication
  2. behavior
  3. pattern lock
  4. smartphone

Qualifiers

  • Poster

Funding Sources

  • the Institute for Information & communications Technology Promotion (IITP)

Conference

CCS '18
Sponsor:

Acceptance Rates

CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)3
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Authentication Mechanisms and Classification: A Literature SurveyIntelligent Computing10.1007/978-3-030-80129-8_69(1051-1070)Online publication date: 6-Jul-2021
  • (2020)Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based DevicesIntelligent and Cloud Computing10.1007/978-981-15-5971-6_29(263-273)Online publication date: 31-Oct-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media