Smartphone-based gait recognition: From authentication to imitation

M Muaaz, R Mayrhofer - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …

Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

L Fridman, S Weber, R Greenstadt… - IEEE Systems …, 2016 - ieeexplore.ieee.org
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …

Are you ready to lock?

S Egelman, S Jain, RS Portnoff, K Liao… - Proceedings of the …, 2014 - dl.acm.org
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …

[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.

JL Cabra, C Parra, D Mendez… - J. Wirel. Mob. Networks …, 2022 - isyou.info
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …

Emerging NUI-based methods for user authentication: A new taxonomy and survey

N Sae-Bae, J Wu, N Memon, J Konrad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …

Behavior change interventions for cybersecurity

P Briggs, D Jeske, L Coventry - Behavior change research and theory, 2017 - Elsevier
While behavior change methods have become relatively commonplace in the health
domain, they have only recently been applied to the cybersecurity field. In this chapter we …

Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager

Y Albayram, J Liu, S Cangonj - … of the 2021 European Symposium on …, 2021 - dl.acm.org
Despite security experts advising the use of password managers to securely manage online
account passwords, the adoption rate of password managers among users is still low. To …

Boosting the guessing attack performance on android lock patterns with smudge attacks

S Cha, S Kwag, H Kim, JH Huh - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Android allows 20 consecutive fail attempts on unlocking a device. This makes it difficult for
pure guessing attacks to crack user patterns on a stolen device before it permanently locks …

Syspal: System-guided pattern locks for android

G Cho, JH Huh, J Cho, S Oh, Y Song… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
To improve the security of user-chosen Android screen lock patterns, we propose a novel
system-guided pattern lock scheme called" SysPal" that mandates the use of a small number …