Proceedings of the 20th Annual International Conference on Mobile Computing and Networking 2014
DOI: 10.1145/2639108.2639141
|View full text |Cite
|
Sign up to set email alerts
|

Itus

Abstract: Security and usability issues with pass-locks on mobile devices have prompted researchers to develop implicit authentication (IA) schemes, which continuously and transparently authenticate users using behavioural biometrics. Contemporary IA schemes proposed by the research community are challenging to deploy, and there is a need for a framework that supports: different behavioural classifiers, given that different apps have different requirements; app developers using IA without becoming domain experts; and re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Knowledge-based authentication methods, such as passwords, PINs or pattern locks (hereafter referred to as passcode), are still the primary methods used to authenticate mobile users (Khan et al, 2014). However, these methods are vulnerable to a number of security threats or attacks, including brute force attacks (Kim, 2012), shoulder surfing (Zakaria et al, 2011), and smudge attacks (Giuffrida et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Knowledge-based authentication methods, such as passwords, PINs or pattern locks (hereafter referred to as passcode), are still the primary methods used to authenticate mobile users (Khan et al, 2014). However, these methods are vulnerable to a number of security threats or attacks, including brute force attacks (Kim, 2012), shoulder surfing (Zakaria et al, 2011), and smudge attacks (Giuffrida et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…This makes behavioral characteristics based authentication simpler and less costly to implement. In general, it includes but not limited to human voice Muda et al (2010), mouth movements Lu et al (2019), keystroke Kim et al (2018); Wu et al (2018); Shekhawat and Bhatt (2019), mouse-operation behavior Ahmed and Traore (2007); Bours and Fullu (2009); Aksari and Artuner (2009); Nakkabi et al (2010); Ahmed and Traore (2011); Shen et al (2012a);Feher et al (2012); Shen et al (2013Shen et al ( , 2014Shen et al ( , 2016; Chong et al (2018Chong et al ( , 2019, as well as software-level behavior Salem and Stolfo (2012); Dash et al (2005); Kholidy et al (2015); Salem and Stolfo (2011); Camina et al (2011);Camiña et al (2014); Nickel et al (2012); Islam and Safavi-Naini (2016); Khan et al (2014); Wang et al (2013). Among these behavioral characteristics, we are the most interested in the software-level behavior and mouse-operation behavior, which we will further study in this dissertation.…”
Section: Overview Of Identity Factorsmentioning
confidence: 99%
“…Software-level behavior includes operation command frequency Salem and Stolfo (2012), operation command ordering Dash et al (2005); Kholidy et al (2015), search behavior Salem and Stolfo (2011); Camina et al (2011);Camiña et al (2014), etc. Although some prior works in this field exist, most of them are platform-specific, such as Nickel et al (2012); Islam and Safavi-Naini (2016) for mobile users, Khan et al (2014) for Android systems, and Wang et al (2013) for social networks.…”
Section: Software-level Behaviormentioning
confidence: 99%
See 1 more Smart Citation