2016
DOI: 10.1145/2898353
|View full text |Cite
|
Sign up to set email alerts
|

Toward Robotic Robbery on the Touch Screen

Abstract: Despite the tremendous amount of research fronting the use of touch gestures as a mechanism of continuous authentication on smart phones, very little research has been conducted to evaluate how these systems could behave if attacked by sophisticated adversaries. In this article, we present two Lego-driven robotic attacks on touch-based authentication: a population statistics-driven attack and a user-tailored attack. The population statistics-driven attack is based on patterns gleaned from a large population of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 21 publications
0
23
0
Order By: Relevance
“…Although there are several advantages associated with the active authentication systems, there are different limitations and problems are facing it which are as follows [49,50,51,56,57]: • Noisy data: the sensed data that recorded by the sensors devices that used in active authentication systems is always affected by some level of impreciseness in measurements. • Non-universality: the active authentication system may not be able to collect meaningful data.…”
Section: Limitations and Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Although there are several advantages associated with the active authentication systems, there are different limitations and problems are facing it which are as follows [49,50,51,56,57]: • Noisy data: the sensed data that recorded by the sensors devices that used in active authentication systems is always affected by some level of impreciseness in measurements. • Non-universality: the active authentication system may not be able to collect meaningful data.…”
Section: Limitations and Challengesmentioning
confidence: 99%
“…• Vulnerabilities: such as spoofing and robot attacks. for example Serwadda et al [57] developed two Lego-driven robotic attacks on touch-based authentication.…”
Section: Limitations and Challengesmentioning
confidence: 99%
“…Earlier work authenticates users while they are being shown controlled stimuli, such as images [13] or moving shapes [14]. Eberz [19] Touch dynamics Assisted manual imitation Perfect [20] Touch dynamics Automatic (robot) None [21] Touch dynamics Automatic (robot) Perfect [22] Gait Assisted manual imitation Perfect [2] ECG Signal generator Cross-device users while they perform standard computer tasks (reading, typing, browsing and watching videos) [15]. Their featureset consists of temporal features reflecting short-term speed and acceleration, spatial features that measure the steadiness of the gaze and the changes of the pupil diameter.…”
Section: Biometric Authenticationmentioning
confidence: 99%
“…This approach significantly increased the system's false accept rate, although the baseline equal error rate is already much higher than that of related work. The authors also consider a targeted attack, for which they assume the attacker has obtained a perfect copy of (some) of the victim's feature vectors [21].…”
Section: Imitation Attacksmentioning
confidence: 99%
“…Threat Scenario -Using gamification for attack: The idea behind this scenario is that a malicious entity puts a game on the app market such that users download and play it. Unbeknownst to the users, the game is instrumented to elicit user moves or actions that enable the capture of security-sensitive data such as behavioral biometric data (e.g., swipe patterns that could later be used to drive attacks such as that in [28]) or even more traditional authentication credentials (e.g., an unlock pattern). For a more focused exposition, we tailor the rest of the description to the pattern lock mechanism since this is the case studied in our experiments.…”
Section: Assumptions: Threat Scenario Vs Benign Scenariomentioning
confidence: 99%