Implicit Authentication through Learning User Behavior

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.

[1]  A. N. Rajagopalan,et al.  Gait-based recognition of humans using continuous HMMs , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[2]  Hendrik Blockeel,et al.  Knowledge Discovery in Databases: PKDD 2003 , 2003, Lecture Notes in Computer Science.

[3]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[4]  Markus Jakobsson,et al.  Server-side detection of malware infection , 2009, NSPW '09.

[5]  Branislav Kveton,et al.  Inferring Identity Using Accelerometers in Television Remote Controls , 2009, Pervasive.

[6]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[7]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[8]  Massimo Tistarelli,et al.  Advanced Studies in Biometrics, Summer School on Biometrics, Alghero, Italy, June 2-6, 2003, Revised Selected Lectures and Papers , 2005, Advanced Studies in Biometrics.

[9]  Julian Fiérrez,et al.  Combining Biometric Evidence for Person Authentication , 2003, Advanced Studies in Biometrics.

[10]  Ran El-Yaniv,et al.  Towards Behaviometric Security Systems: Learning to Identify a Typist , 2003, PKDD.

[11]  Jacob Beal,et al.  Cognitive security for personal devices , 2008, AISec '08.

[12]  Markus Jakobsson,et al.  Implicit authentication for mobile devices , 2009 .

[13]  Deborah Estrin,et al.  Diversity in smartphone usage , 2010, MobiSys '10.

[14]  Lee Rainie,et al.  The future of the Internet III , 2009 .

[15]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[16]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[17]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[18]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[19]  Maria Luisa Damiani,et al.  Towards movement-aware access control , 2008, SPRINGL '08.

[20]  Roberto Brunelli,et al.  Person identification using multiple cues , 1995, IEEE Transactions on Pattern Analysis and Machine Intelligence.