Mobile authentication for software engineering: A case study of research and development student projects

This paper presents an ongoing work on integrating computer security topics into project-based software engineering courses. We describe two projects, in which students follow an incremental delivery software process and a scrum-like software process to design and implement two different authentication systems for mobile devices. The project topics and the software processes were matched to better reflect the nature of the implemented systems.

[1]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[2]  Jacob O. Wobbrock,et al.  TapSongs: tapping rhythm-based passwords on a single binary sensor , 2009, UIST '09.

[3]  Peter M. Corcoran,et al.  Biometrics and Consumer Electronics: A Brave New World or the Road to Dystopia? [Soapbox] , 2013, IEEE Consumer Electronics Magazine.

[4]  Zachary N. J. Peterson,et al.  Security through play , 2013, IEEE Security & Privacy.

[5]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[6]  Roger S. Pressman,et al.  Software Engineering: A Practitioner's Approach , 1982 .

[7]  Luís Carriço,et al.  Under the table: tap authentication for smartphones , 2013, BCS HCI.

[8]  Kwontaeg Choi,et al.  Realtime training on mobile devices for face recognition applications , 2011, Pattern Recognit..

[9]  Raymond N. J. Veldhuis,et al.  Biometric Authentication for a Mobile Personal Device , 2006 .

[10]  Xiannong Meng,et al.  Approaches to Undergraduate Instruction in Computer Security , 2005 .

[11]  Stanislav Kurkovsky,et al.  Experiments with Simple Iris Recognition for Mobile Phones , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[12]  Chun Wai Liew,et al.  Scrum and Agile Methods in Software Engineering Courses , 2016, SIGCSE.

[13]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[14]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Ming Yang,et al.  Learning mobile security with android security labware , 2013, SIGCSE '13.

[16]  Sheikh Ghafoor,et al.  Empowering faculty to embed security topics into computer science courses , 2014, ITiCSE '14.

[17]  Raul Sánchez-Reillo,et al.  Handwritten signature recognition in mobile scenarios: Performance evaluation , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).