Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2565585.2565592acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

TIPS: context-aware implicit user identification using touch screen in uncontrolled environments

Published: 26 February 2014 Publication History

Abstract

Due to the dramatical increase in popularity of mobile devices in the last decade, more sensitive user information is stored and accessed on these devices everyday. However, most existing technologies for user authentication only cover the login stage or only work in restricted controlled environments or GUIs in the post login stage. In this work, we present TIPS, a Touch based Identity Protection Service that implicitly and unobtrusively authenticates users in the background by continuously analyzing touch screen gestures in the context of a running application. To the best of our knowledge, this is the first work to incorporate contextual app information to improve user authentication. We evaluate TIPS over data collected from 23 phone owners and deployed it to 13 of them with 100 guest users. TIPS can achieve over 90% accuracy in real-life naturalistic conditions within a small amount of computational overhead and 6% of battery usage.

References

[1]
"Worldwide smartphone markets: 2011 to 2015 - analysis, data, insight and forecasts," http://www.researchandmarkets.com/research/7a1189/worldwide_smartphone.
[2]
M. Jakobsson, E. Shi, and R. Chow, "Implicit authentication for mobile devices," in 4th USENIX Workshop on HotSec, 2009.
[3]
T. Feng, Z. Liu, K. Kwon, W. Shi, B. Carbunar, Y. Jiang, and N. Nguyen, "Continuous mobile authentication using touchscreen gestures," in IEEE HST, 2012.
[4]
N. Sae-Bae, N. Memon, and K. Isbister, "Investigating multi-touch gestures as a novel biometric modality," in IEEE BTAS, 2012.
[5]
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication," Information Forensics and Security, IEEE Transactions on, 2013.
[6]
X. Zhao, T. Feng, and W. Shi, "Continuous mobile authentication using a novel graphic touch gesture feature," in IEEE BTAS, 2013.
[7]
J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. Makela, and H. Ailisto, "Identifying users of portable devices from gait pattern with accelerometers," in IEEE ICASSP, 2005.
[8]
P. Marcus, M. Kessel, and C. Linnhoff-Popien, "Securing mobile device-based machine interactions with user location histories," in Security and Privacy in Mobile Information and Communication Systems. 2012.
[9]
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in ACM CHI, 2012.
[10]
W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong, "Senguard: Passive user identification on smartphones using multiple sensors," in IEEE WiMob, 2011.
[11]
H. Lu, A. J. Bernheim Brush, B. Priyantha, A. Karlson, and J. Liu, "Speakersense: Energy efficient unobtrusive speaker identification on mobile phones," in IEEE Pervasive Computing. 2011.
[12]
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, "Touch me once and i know it's you!: implicit authentication based on touch screen patterns," in ACM CHI, 2012.
[13]
M. Shahzad, A. Liu, and A. Samuel, "Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it," in MobiCom, 2013.
[14]
C. Bo, L. Zhang, and X. Li, "Silentsense: Silent user identification via dynamics of touch and movement behavioral biometrics," in MobiCom, 2013.

Cited By

View all
  • (2024)Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank AlgorithmsIEEE Transactions on Mobile Computing10.1109/TMC.2024.335320923:9(8839-8854)Online publication date: Sep-2024
  • (2024)AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multimodality DataIEEE Internet of Things Journal10.1109/JIOT.2023.331471711:4(6928-6942)Online publication date: 15-Feb-2024
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HotMobile '14: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
February 2014
134 pages
ISBN:9781450327428
DOI:10.1145/2565585
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2014

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

HotMobile '14
Sponsor:

Acceptance Rates

HotMobile '14 Paper Acceptance Rate 22 of 72 submissions, 31%;
Overall Acceptance Rate 96 of 345 submissions, 28%

Upcoming Conference

HOTMOBILE '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank AlgorithmsIEEE Transactions on Mobile Computing10.1109/TMC.2024.335320923:9(8839-8854)Online publication date: Sep-2024
  • (2024)AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multimodality DataIEEE Internet of Things Journal10.1109/JIOT.2023.331471711:4(6928-6942)Online publication date: 15-Feb-2024
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • (2024)SwipeFormer: Transformers for mobile touchscreen biometricsExpert Systems with Applications10.1016/j.eswa.2023.121537237(121537)Online publication date: Mar-2024
  • (2023)MAUTH: Continuous User Authentication Based on Subtle Intrinsic Muscular TremorsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3243687(1-13)Online publication date: 2023
  • (2023)BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2022.316645422:8(4548-4562)Online publication date: 1-Aug-2023
  • (2023)All about that BASE: Modeling Biometric Authentication Systems and their Evaluations to enable a more efficient Exchange of Research Results2023 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB57857.2023.10448589(1-10)Online publication date: 25-Sep-2023
  • (2023)Considerations and ChallengesContinuous Biometric Authentication Systems10.1007/978-3-031-49071-2_5(105-116)Online publication date: 29-Oct-2023
  • (2023)Pattern unlocking guided multi‐modal continuous authentication for smartphone with multi‐branch context‐aware representation learning and auto encoderTransactions on Emerging Telecommunications Technologies10.1002/ett.490835:1Online publication date: Dec-2023
  • (2022)WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart CitySensors10.3390/s2218698022:18(6980)Online publication date: 15-Sep-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media