Spoofing analysis of mobile device data as behavioral biometric modalities
- 1 October 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2017 IEEE International Joint Conference on Biometrics (IJCB)
Abstract
While mobile devices are no longer a new technology, using the data generated from the use of these devices for security purposes has just recently been explored. Current methods, such as passwords, are quickly becoming antiquated, lacking the robustness, accuracy, and convenience desired to serve as reliable security measures. Since, researchers have resorted to alternative techniques, such as measurements obtained from keyboard interactions and movement, and behavioral interactions, such as application usage. However, practical implementations require further evaluation of circumvention. Thus, this work thoroughly analyzes various threats against mobile devices which use mobile device usage data as behavioral biometrics for authentication. Experimental results indicate that an outsider with a certain level of knowledge regarding the behavior of the device's owner poses a great security threat. Possible countermeasures to prevent such attacks are also provided.Keywords
This publication has 24 references indexed in Scilit:
- Surveying Biometric Authentication for Mobile Device SecurityJournal of Pattern Recognition Research, 2016
- Android based mobile application development for web login authentication using fingerprint recognition featurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Know your enemyPublished by Association for Computing Machinery (ACM) ,2013
- Classification Based on Predictive Association Rules of Incomplete DataIEICE Transactions on Information and Systems, 2012
- Implicit Authentication through Learning User BehaviorLecture Notes in Computer Science, 2011
- Keystroke dynamics-based authentication for mobile devicesComputers & Security, 2009
- Identifying Users of Portable Devices from Gait Pattern with AccelerometersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Mining fuzzy association rules for classification problemsComputers & Industrial Engineering, 2002
- Classification Using Association Rules: Weaknesses and EnhancementsPublished by Springer Science and Business Media LLC ,2001
- MINING ASSOCIATION RULES FROM MARKET BASKET DATA USING SHARE MEASURES AND CHARACTERIZED ITEMSETSInternational Journal on Artificial Intelligence Tools, 1998