2021
DOI: 10.1145/3448080
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones

Abstract: Pattern lock has been widely used in smartphones as a simple and effective authentication mechanism, which however is shown to be vulnerable to various attacks. In this paper, we design a novel authentication system for more secure pattern unlocking on smartphones. The basic idea is to utilize various behavior information of the user during pattern unlocking as additional authentication fingerprints, so that even if the pattern password is leaked to an attacker, the system remains safe and protected. To accomm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(39 citation statements)
references
References 43 publications
1
26
0
Order By: Relevance
“…Wang et al [40] proposed a context-aware module to classify the application scenario, and send the weighted user data to the corresponding authentication module. Shi et al [41] further adopted a polygonal line weighted strategy. This method takes consistency of unlocking patterns into account, then analyzes the patterns with different grains, and enhances the information stored in the patterns' principal parts though weighting.…”
Section: Solutions Of Implicit Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al [40] proposed a context-aware module to classify the application scenario, and send the weighted user data to the corresponding authentication module. Shi et al [41] further adopted a polygonal line weighted strategy. This method takes consistency of unlocking patterns into account, then analyzes the patterns with different grains, and enhances the information stored in the patterns' principal parts though weighting.…”
Section: Solutions Of Implicit Authenticationmentioning
confidence: 99%
“…This requirement diminishes the value of authentication in real world applications. Some recent studies [13], [40], [41] applied conventional binary classifiers to address this problem. But this approach relies heavily on manually extracted features from the raw data.…”
Section: A the Representation Learnermentioning
confidence: 99%
See 1 more Smart Citation
“…Krasovec et al 88 proposed an IoT testbed to gather behavior data, such as a person's movement in space, interaction with certain physical objects, PC terminal usage, keyboard typing etc., which further can be analyzed for authentication purpose. In another paper, a behavior biometrics-based authentication system 89 can be deployed in a smartphone's pattern lock. Similarly, Kumar et al 90 proposed Aquilis, a smartphone-based privacy protection system on this front.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Similarly, Kumar et al 90 proposed Aquilis, a smartphone-based privacy protection system on this front. On the other hand, the "Privacy" session discusses different aspects of privacy concerns in this domain, including privacy-preserving customization framework for edge computing, 91 privacy implications in location tracking, 89 spatial privacy risks in mobilemixed reality data, 92 location privacy in crowd-sensing photos 93 and privacy-preserving federated learning. 94 In the Q&A session, the audience was interested in "thread modeling," "generalization of Aquilis modeling,' 'and "adversarial geo-identification" concerns regarding location images and "one's privacy preferences."…”
Section: Privacy and Securitymentioning
confidence: 99%