2014
DOI: 10.1007/978-3-319-08509-8_6
|View full text |Cite
|
Sign up to set email alerts
|

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics

Abstract: Abstract. Mobile devices have become an important part of our everyday life, harvesting more and more confidential user information. Their portable nature and the great exposure to security attacks, however, call out for stronger authentication mechanisms than simple password-based identification. Biometric authentication techniques have shown potential in this context. Unfortunately, prior approaches are either excessively prone to forgery or have too low accuracy to foster widespread adoption.In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
80
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(85 citation statements)
references
References 48 publications
4
80
0
1
Order By: Relevance
“…Keystroke dynamics for authenticating mobile phone users have also been widely studied [15,17,21,36,39]. A body of work has also been conducted on Unobtrusive methods for IA on mobile phones such as Gait-based IA schemes [11,35] and context aware schemes [5,16,33].…”
Section: Related Workmentioning
confidence: 99%
“…Keystroke dynamics for authenticating mobile phone users have also been widely studied [15,17,21,36,39]. A body of work has also been conducted on Unobtrusive methods for IA on mobile phones such as Gait-based IA schemes [11,35] and context aware schemes [5,16,33].…”
Section: Related Workmentioning
confidence: 99%
“…First of all, we group them by an interval between pressing and releasing a key and discard the rest of them. Then there are 5 formulas for the grouped data: average value (mean), root mean square (RMS), sum of positive values (pos), sum of positive values (neg), and standard deviation (std) [11].…”
Section: Formulas For Motion Datamentioning
confidence: 99%
“…This imitation attack poses an threat to keystroke dynamics based user authentication. Giuffrida et al (2014) proposed using sensor-enhanced keystroke dynamics to authenticate users typing on mobile devices. A limitation of their solution is that it works on mobile devices only.…”
Section: Keystroke Dynamicsmentioning
confidence: 99%