2013
DOI: 10.1016/j.cose.2012.10.002
|View full text |Cite
|
Sign up to set email alerts
|

From keyloggers to touchloggers: Take the rough with the smooth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…However, the 10 minutes session length is a serious limitation of this authentication scheme, as a phone should detect an intruder in a much shorter time. Damopoulos et al (2013) implemented a touchlogger for iOS based smartphones to demonstrate the ability of touch data for user identification. This paper presents touch data collected through natural usage of smartphones.…”
Section: Touch Usage Based User Profilingmentioning
confidence: 99%
“…However, the 10 minutes session length is a serious limitation of this authentication scheme, as a phone should detect an intruder in a much shorter time. Damopoulos et al (2013) implemented a touchlogger for iOS based smartphones to demonstrate the ability of touch data for user identification. This paper presents touch data collected through natural usage of smartphones.…”
Section: Touch Usage Based User Profilingmentioning
confidence: 99%
“…In the following, we survey the most relevant techniques in the area and refer the interested reader to more complete surveys [17].…”
Section: Related Workmentioning
confidence: 99%
“…Damopoulos et al [17] proposed a continuous authentication system using only touchscreen gestures. The authors reported a low 1% EER using predetermined touch patterns.…”
Section: Gesture-based Authenticationmentioning
confidence: 99%
“…location-based services, Internet sharing via tethering, and intelligent voice assistance to name just a few. In addition to the traditional cyber attacks and malware threats that plague legacy computers, smartphones now represent a promising target for malware developers that struggle to expose users sensitive data, compromise the device or manipulate popular services (Damopoulos et al, 2011(Damopoulos et al, , 2012a(Damopoulos et al, , 2013. Additionally, the number of stolen or lost smartphones has increased rapidly over the last few years.…”
Section: Introductionmentioning
confidence: 99%