Implicit authentication for mobile devices

We introduce the notion of implicit authentication - the ability to authenticate mobile users based on actions they would carry out anyway. We develop a model for how to perform implicit authentication, and describe experiments aimed at assessing the benefits of our techniques. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security.

[1]  Maria Luisa Damiani,et al.  Towards movement-aware access control , 2008, SPRINGL '08.

[2]  Branislav Kveton,et al.  Inferring Identity Using Accelerometers in Television Remote Controls , 2009, Pervasive.

[3]  Ran El-Yaniv,et al.  Towards Behaviometric Security Systems: Learning to Identify a Typist , 2003, PKDD.

[4]  Roberto Brunelli,et al.  Person identification using multiple cues , 1995, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Julian Fiérrez,et al.  Combining Biometric Evidence for Person Authentication , 2003, Advanced Studies in Biometrics.

[6]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[7]  Jacob Beal,et al.  Cognitive security for personal devices , 2008, AISec '08.

[8]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[9]  Farnam Jahanian,et al.  CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.

[10]  A. N. Rajagopalan,et al.  Gait-based recognition of humans using continuous HMMs , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[11]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[12]  Markus Jakobsson,et al.  Server-side detection of malware infection , 2009, NSPW '09.

[13]  Shashi Shekhar,et al.  Discovering personally meaningful places: An interactive clustering approach , 2007, TOIS.

[14]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[15]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.