2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.51
|View full text |Cite
|
Sign up to set email alerts
|

ZEBRA: Zero-Effort Bilateral Recurring Authentication

Abstract: Common authentication methods based on passwords, tokens, or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. Users often do not log out, however, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals. One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Sever… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
124
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 91 publications
(126 citation statements)
references
References 18 publications
2
124
0
Order By: Relevance
“…We selected schemes that targeted IoT scenarios and utilized different context information or context features. We excluded schemes based on behavioral biometrics, e.g., gait [4], gesture [27] or keystroke dynamics [19], as these schemes designed for wearable IoT scenarios. In the end, we arrived at five schemes, which we reproduced from the ground up, relying on the help of the original authors to ensure the correctness of our implementations.…”
Section: Reproduced Zis Schemesmentioning
confidence: 99%
“…We selected schemes that targeted IoT scenarios and utilized different context information or context features. We excluded schemes based on behavioral biometrics, e.g., gait [4], gesture [27] or keystroke dynamics [19], as these schemes designed for wearable IoT scenarios. In the end, we arrived at five schemes, which we reproduced from the ground up, relying on the help of the original authors to ensure the correctness of our implementations.…”
Section: Reproduced Zis Schemesmentioning
confidence: 99%
“…An inspirational work. The closest work to our approach is proposed in [49] called ZEBRA. In ZEBRA, users are classified according to the sequence of interactions (e.g., typing, scrolling), where the user wears a bracelet with motion sensors and radio.…”
Section: Related Workmentioning
confidence: 99%
“…WACA captures the sensor readings through a smartwatch without interrupting the user, i.e., unobtrusively. However, unlike time-out or classical keystroke dynamics, it requires an extra channel to collect data, but obviously a smartwatch Proximity [51], [52] na Face [53], [33] Fingerprint [42] Eye-movement [13] Keystroke [54] ZEBRA [49] WACA (this work) = offers the benefit; = almost offers the benefit; no circle = does not offer the benefit. is a not a customized hardware, i.e., it is an off-the-shelf device, so we say it partially supports the benefit of Nothing-to-Carry and since its error is very low, it also offers the benefit of Infrequent-Errors.…”
Section: Related Workmentioning
confidence: 99%
“…Wrist movement monitoring (e.g., using an accelerometer and a gyroscope contained in a bracelet as in [12]) has much the same flaws as keystroke dynamics. Moreover, recent results [9] demonstrated a worrisome weakness of this approach.…”
Section: Continuous Authenticationmentioning
confidence: 99%