Continuous Implicit Authentication through Touch Traces Modelling

Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research...

Full description

Saved in:
Bibliographic Details
Published in:2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) pp. 111 - 120
Main Authors: Karanikiotis, Thomas, Papamichail, Michail D., Chatzidimitriou, Kyriakos C., Oikonomou, Napoleon-Christos I., Symeonidis, Andreas L., Saripalle, Sashi K.
Format: Conference Proceeding
Language:English
Published: IEEE 01-12-2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit authentication on the basis of behavioral biometrics. In this work, we propose a methodology towards continuous implicit authentication that refrains from the limitations imposed by small-scale and/or controlled environment experiments by employing a real-world application used widely by a large number of individuals. Upon constructing our models using Support Vector Machines, we introduce a confidence-based methodology, in order to strengthen the effectiveness and the efficiency of our approach. The evaluation of our methodology on a set of diverse scenarios indicates that our approach achieves good results both in terms of efficiency and usability.
AbstractList Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit authentication on the basis of behavioral biometrics. In this work, we propose a methodology towards continuous implicit authentication that refrains from the limitations imposed by small-scale and/or controlled environment experiments by employing a real-world application used widely by a large number of individuals. Upon constructing our models using Support Vector Machines, we introduce a confidence-based methodology, in order to strengthen the effectiveness and the efficiency of our approach. The evaluation of our methodology on a set of diverse scenarios indicates that our approach achieves good results both in terms of efficiency and usability.
Author Saripalle, Sashi K.
Karanikiotis, Thomas
Oikonomou, Napoleon-Christos I.
Symeonidis, Andreas L.
Papamichail, Michail D.
Chatzidimitriou, Kyriakos C.
Author_xml – sequence: 1
  givenname: Thomas
  surname: Karanikiotis
  fullname: Karanikiotis, Thomas
  email: thomas.karanikiotis@issel.ee.auth.gr
  organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece
– sequence: 2
  givenname: Michail D.
  surname: Papamichail
  fullname: Papamichail, Michail D.
  email: mpapamic@issel.ee.auth.gr
  organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece
– sequence: 3
  givenname: Kyriakos C.
  surname: Chatzidimitriou
  fullname: Chatzidimitriou, Kyriakos C.
  email: kyrcha@issel.ee.auth.gr
  organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece
– sequence: 4
  givenname: Napoleon-Christos I.
  surname: Oikonomou
  fullname: Oikonomou, Napoleon-Christos I.
  email: napoleon.oikonomou@issel.ee.auth.gr
  organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece
– sequence: 5
  givenname: Andreas L.
  surname: Symeonidis
  fullname: Symeonidis, Andreas L.
  email: asymeon@eng.auth.gr
  organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece
– sequence: 6
  givenname: Sashi K.
  surname: Saripalle
  fullname: Saripalle, Sashi K.
  email: sashi@zoloz.com
  organization: ZOLOZ,Kansas City,MO,USA,64108
BookMark eNotjMtqwzAURFVoF03aL8jGP-D06grJ0tKYPgIJpW26DrJ8FQscKdjyon9fQ7uZOQyHWbHbmCIxtuGw5RzM08fnl1wAtwgIWwBAdcNWvELNteFC3bO6STGHOKd5KnaX6xBcyEU9556W2dkcUixyP6b53BfHNLslR-toKg6po2EI8fzA7rwdJnr87zX7fnk-Nm_l_v1119T7MiCIXLborOPOkictWuNU20ohra466ZwQ5DtEMN4rkq3rFhMMeCslJ2UsaBRrtvn7DUR0uo7hYsefk0GNlQLxC8sASJ0
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/QRS51102.2020.00026
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728189136
9781728189130
EndPage 120
ExternalDocumentID 9282760
Genre orig-research
GrantInformation_xml – fundername: European Regional Development Fund
  funderid: 10.13039/501100008530
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-b2cac1caefe83b9c6bb535a87d5cc33efd2209ff6e5bcdc1c090fa551e69a0823
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:21 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-b2cac1caefe83b9c6bb535a87d5cc33efd2209ff6e5bcdc1c090fa551e69a0823
PageCount 10
ParticipantIDs ieee_primary_9282760
PublicationCentury 2000
PublicationDate 2020-Dec.
PublicationDateYYYYMMDD 2020-12-01
PublicationDate_xml – month: 12
  year: 2020
  text: 2020-Dec.
PublicationDecade 2020
PublicationTitle 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)
PublicationTitleAbbrev QRS
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8526005
Snippet Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on...
SourceID ieee
SourceType Publisher
StartPage 111
SubjectTerms Authentication
Implicit Authentication
Security
Smartphone Security
Software quality
Software reliability
Support vector machines
Task analysis
Touch Traces Modelling
Usability
Title Continuous Implicit Authentication through Touch Traces Modelling
URI https://ieeexplore.ieee.org/document/9282760
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLZoJyZALeKWB0ZMnbi24xFBq7IgoEViq3w8S11SVJr_Xz8nKgwsLJblRLKcDO_wdxByGwC80iqyIENg47HgzConGYRYgedC6uwSMZvrl8_qaYIyOXd7LgwAZPAZ3OM03-WHtW-wVTYyqT7QKhXoPW2qlqvVCQkV3Ize3ucpe8jsqhLxWlkw4ZdlSo4Y06P_7XVMhj_UO_q6Dyon5ADqAXlADalV3aQqnT5nCPhqS7G5hVCftudGO8Mdulg3Po0bhFpRdDrLottD8jGdLB5nrPM-YKuSiy1zpbe-8BYiVMIZr5yTQtpKB-m9EBBDWXITowLpfEhvcsOjTekPKGPx9uyU9Ot1DWeE6pQB-lRAp0cwlqWrCpA2RC0EkgWdOicDPP7yq5W3WHYnv_h7-ZIc4vdtER1XpL_dNHBNet-huck_ZAezh5Am
link.rule.ids 310,311,782,786,791,792,798,27936,54770
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLagDDABahE3HhgxdePYTkYErVJRKqBBYqt8PEtd0qo0_x_biQoDC4tlOZEsJ8M7_B0I3VoAI6RwxHJrSZoySpTQnIB1GRjKuIwuEcVMTj-zp2GQybnbcmEAIILP4D5M412-XZo6tMr6ua8PpPAF-h5PpaQNW6uVEhrQvP_2PvP5Q-RXJQGxFSUTfpmmxJgxOvzfbkeo90O-w6_bsHKMdqDqooegIrWoal-n43EEgS82OLS3Atin6brh1nIHl8va-HEdwFY4eJ1F2e0e-hgNy8eCtO4HZJFQtiE6McoMjAIHGdO5EVpzxlUmLTeGMXA2SWjunACujfVv0pw65RMgELkK92cnqFMtKzhFWPoc0PgS2j-ClCc6GwBX1knGAl1QizPUDcefrxqBi3l78vO_l2_QflG-TOaT8fT5Ah2Eb93gOy5RZ7Ou4Qrtftn6Ov6cb3Bvk3E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+20th+International+Conference+on+Software+Quality%2C+Reliability+and+Security+%28QRS%29&rft.atitle=Continuous+Implicit+Authentication+through+Touch+Traces+Modelling&rft.au=Karanikiotis%2C+Thomas&rft.au=Papamichail%2C+Michail+D.&rft.au=Chatzidimitriou%2C+Kyriakos+C.&rft.au=Oikonomou%2C+Napoleon-Christos+I.&rft.date=2020-12-01&rft.pub=IEEE&rft.spage=111&rft.epage=120&rft_id=info:doi/10.1109%2FQRS51102.2020.00026&rft.externalDocID=9282760