GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Collection

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
View Item 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Sicherheit
  • P228 - Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Sicherheit
  • P228 - Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit
  • View Item

Continuous authentication on mobile devices by analysis of typing motion behavior

Author:
Gascon, Hugo [DBLP] ;
Uellenbeck, Sebastian [DBLP] ;
Wolf, Christopher [DBLP] ;
Rieck, Konrad [DBLP]
Abstract
Smartphones have become the standard personal device to store private or sensitive information. Widely used as every day gadget, however, they are susceptible to get lost or stolen. To protect information on a smartphone from being physically accessed by attackers, a lot of authentication methods have been proposed in recent years. Each one of them suffers from certain drawbacks, either they are easy to circumvent, vulnerable against shoulder surfing attacks, or cumbersome to use. In this paper, we present an alternative approach for user authentication that is based on the smartphone's sensors. By making use of the user's biometrical behavior while entering text into the smartphone, we transparently authenticate the user in an ongoing-fashion. In a field study, we asked more than 300 participants to enter some short sentences into a smartphone while all available sensor events were recorded to determine a typing motion fingerprint of the user. After the proper feature extraction, a machine learning classifier based on Support Vector Machines (SVM) is used to identify the authorized user. The results of our study are twofold: While our approach is able to continuously authenticate some users with high precision, there also exist participants for which no accurate motion fingerprint can be learned. We analyze these difference in detail and provide guidelines for similar problems.
  • Citation
  • BibTeX
Gascon, H., Uellenbeck, S., Wolf, C. & Rieck, K., (2014). Continuous authentication on mobile devices by analysis of typing motion behavior. In: Katzenbeisser, S., Lotz, V. & Weippl, E. (Hrsg.), Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit. Bonn: Gesellschaft für Informatik e.V.. (S. 1-12).
@inproceedings{mci/Gascon2014,
author = {Gascon, Hugo AND Uellenbeck, Sebastian AND Wolf, Christopher AND Rieck, Konrad},
title = {Continuous authentication on mobile devices by analysis of typing motion behavior},
booktitle = {Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit},
year = {2014},
editor = {Katzenbeisser, Stefan AND Lotz, Volkmar AND Weippl, Edgar} ,
pages = { 1-12 },
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn}
}
DateienGroesseFormatAnzeige
1.pdf221.8Kb PDF View/Open

Haben Sie fehlerhafte Angaben entdeckt? Sagen Sie uns Bescheid: Send Feedback

More Info

ISBN: 978-3-88579-622-0
ISSN: 1617-5468
xmlui.MetaDataDisplay.field.date: 2014
Language: en (en)
Content Type: Text/Conference Paper
Collections
  • P228 - Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit [38]

Show full item record


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.