Continuous Implicit Authentication through Touch Traces Modelling
Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research...
Saved in:
Published in: | 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) pp. 111 - 120 |
---|---|
Main Authors: | , , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-12-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit authentication on the basis of behavioral biometrics. In this work, we propose a methodology towards continuous implicit authentication that refrains from the limitations imposed by small-scale and/or controlled environment experiments by employing a real-world application used widely by a large number of individuals. Upon constructing our models using Support Vector Machines, we introduce a confidence-based methodology, in order to strengthen the effectiveness and the efficiency of our approach. The evaluation of our methodology on a set of diverse scenarios indicates that our approach achieves good results both in terms of efficiency and usability. |
---|---|
AbstractList | Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on privacy and security. In this context and given the known limitations and deficiencies of traditional authentication mechanisms, a lot of research efforts are targeted towards continuous implicit authentication on the basis of behavioral biometrics. In this work, we propose a methodology towards continuous implicit authentication that refrains from the limitations imposed by small-scale and/or controlled environment experiments by employing a real-world application used widely by a large number of individuals. Upon constructing our models using Support Vector Machines, we introduce a confidence-based methodology, in order to strengthen the effectiveness and the efficiency of our approach. The evaluation of our methodology on a set of diverse scenarios indicates that our approach achieves good results both in terms of efficiency and usability. |
Author | Saripalle, Sashi K. Karanikiotis, Thomas Oikonomou, Napoleon-Christos I. Symeonidis, Andreas L. Papamichail, Michail D. Chatzidimitriou, Kyriakos C. |
Author_xml | – sequence: 1 givenname: Thomas surname: Karanikiotis fullname: Karanikiotis, Thomas email: thomas.karanikiotis@issel.ee.auth.gr organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece – sequence: 2 givenname: Michail D. surname: Papamichail fullname: Papamichail, Michail D. email: mpapamic@issel.ee.auth.gr organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece – sequence: 3 givenname: Kyriakos C. surname: Chatzidimitriou fullname: Chatzidimitriou, Kyriakos C. email: kyrcha@issel.ee.auth.gr organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece – sequence: 4 givenname: Napoleon-Christos I. surname: Oikonomou fullname: Oikonomou, Napoleon-Christos I. email: napoleon.oikonomou@issel.ee.auth.gr organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece – sequence: 5 givenname: Andreas L. surname: Symeonidis fullname: Symeonidis, Andreas L. email: asymeon@eng.auth.gr organization: Aristotle University of Thessaloniki,Electrical and Computer Engineering Dept.,Thessaloniki,Greece – sequence: 6 givenname: Sashi K. surname: Saripalle fullname: Saripalle, Sashi K. email: sashi@zoloz.com organization: ZOLOZ,Kansas City,MO,USA,64108 |
BookMark | eNotjMtqwzAURFVoF03aL8jGP-D06grJ0tKYPgIJpW26DrJ8FQscKdjyon9fQ7uZOQyHWbHbmCIxtuGw5RzM08fnl1wAtwgIWwBAdcNWvELNteFC3bO6STGHOKd5KnaX6xBcyEU9556W2dkcUixyP6b53BfHNLslR-toKg6po2EI8fzA7rwdJnr87zX7fnk-Nm_l_v1119T7MiCIXLborOPOkictWuNU20ohra466ZwQ5DtEMN4rkq3rFhMMeCslJ2UsaBRrtvn7DUR0uo7hYsefk0GNlQLxC8sASJ0 |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/QRS51102.2020.00026 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1728189136 9781728189130 |
EndPage | 120 |
ExternalDocumentID | 9282760 |
Genre | orig-research |
GrantInformation_xml | – fundername: European Regional Development Fund funderid: 10.13039/501100008530 |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-b2cac1caefe83b9c6bb535a87d5cc33efd2209ff6e5bcdc1c090fa551e69a0823 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:21 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-b2cac1caefe83b9c6bb535a87d5cc33efd2209ff6e5bcdc1c090fa551e69a0823 |
PageCount | 10 |
ParticipantIDs | ieee_primary_9282760 |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec. |
PublicationDateYYYYMMDD | 2020-12-01 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec. |
PublicationDecade | 2020 |
PublicationTitle | 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) |
PublicationTitleAbbrev | QRS |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8526005 |
Snippet | Nowadays, the continuously increasing use of smart-phones as the primary way of dealing with day-to-day tasks raises several concerns mainly focusing on... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 111 |
SubjectTerms | Authentication Implicit Authentication Security Smartphone Security Software quality Software reliability Support vector machines Task analysis Touch Traces Modelling Usability |
Title | Continuous Implicit Authentication through Touch Traces Modelling |
URI | https://ieeexplore.ieee.org/document/9282760 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLZoJyZALeKWB0ZMnbi24xFBq7IgoEViq3w8S11SVJr_Xz8nKgwsLJblRLKcDO_wdxByGwC80iqyIENg47HgzConGYRYgedC6uwSMZvrl8_qaYIyOXd7LgwAZPAZ3OM03-WHtW-wVTYyqT7QKhXoPW2qlqvVCQkV3Ize3ucpe8jsqhLxWlkw4ZdlSo4Y06P_7XVMhj_UO_q6Dyon5ADqAXlADalV3aQqnT5nCPhqS7G5hVCftudGO8Mdulg3Po0bhFpRdDrLottD8jGdLB5nrPM-YKuSiy1zpbe-8BYiVMIZr5yTQtpKB-m9EBBDWXITowLpfEhvcsOjTekPKGPx9uyU9Ot1DWeE6pQB-lRAp0cwlqWrCpA2RC0EkgWdOicDPP7yq5W3WHYnv_h7-ZIc4vdtER1XpL_dNHBNet-huck_ZAezh5Am |
link.rule.ids | 310,311,782,786,791,792,798,27936,54770 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV05T8MwFLagDDABahE3HhgxdePYTkYErVJRKqBBYqt8PEtd0qo0_x_biQoDC4tlOZEsJ8M7_B0I3VoAI6RwxHJrSZoySpTQnIB1GRjKuIwuEcVMTj-zp2GQybnbcmEAIILP4D5M412-XZo6tMr6ua8PpPAF-h5PpaQNW6uVEhrQvP_2PvP5Q-RXJQGxFSUTfpmmxJgxOvzfbkeo90O-w6_bsHKMdqDqooegIrWoal-n43EEgS82OLS3Atin6brh1nIHl8va-HEdwFY4eJ1F2e0e-hgNy8eCtO4HZJFQtiE6McoMjAIHGdO5EVpzxlUmLTeGMXA2SWjunACujfVv0pw65RMgELkK92cnqFMtKzhFWPoc0PgS2j-ClCc6GwBX1knGAl1QizPUDcefrxqBi3l78vO_l2_QflG-TOaT8fT5Ah2Eb93gOy5RZ7Ou4Qrtftn6Ov6cb3Bvk3E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+20th+International+Conference+on+Software+Quality%2C+Reliability+and+Security+%28QRS%29&rft.atitle=Continuous+Implicit+Authentication+through+Touch+Traces+Modelling&rft.au=Karanikiotis%2C+Thomas&rft.au=Papamichail%2C+Michail+D.&rft.au=Chatzidimitriou%2C+Kyriakos+C.&rft.au=Oikonomou%2C+Napoleon-Christos+I.&rft.date=2020-12-01&rft.pub=IEEE&rft.spage=111&rft.epage=120&rft_id=info:doi/10.1109%2FQRS51102.2020.00026&rft.externalDocID=9282760 |