Continuous Authentication of Smartphones Based on Application Usage

07/18/2018
by   Upal Mahbub, et al.
0

An empirical investigation of active/continuous authentication for smartphones is presented in this paper by exploiting users' unique application usage data, i.e., distinct patterns of use, modeled by a Markovian process. Variations of Hidden Markov Models (HMMs) are evaluated for continuous user verification, and challenges due to the sparsity of session-wise data, an explosion of states, and handling unforeseen events in the test data are tackled. Unlike traditional approaches, the proposed formulation does not depend on the top N-apps, rather uses the complete app-usage information to achieve low latency. Through experimentation, empirical assessment of the impact of unforeseen events, i.e., unknown applications and unforeseen observations, on user verification is done via a modified edit-distance algorithm for simple sequence matching. It is found that for enhanced verification performance, unforeseen events should be incorporated in the models by adopting smoothing techniques with HMMs. For validation, extensive experiments on two distinct datasets are performed. The marginal smoothing technique is the most effective for user verification in terms of equal error rate (EER) and with a sampling rate of 1/30s^-1 and 30 minutes of historical data, and the method is capable of detecting an intrusion within 2.5 minutes of application use.

READ FULL TEXT
research
10/25/2016

PATH: Person Authentication using Trace Histories

In this paper, a solution to the problem of Active Authentication using ...
research
10/25/2016

Active User Authentication for Smartphones: A Challenge Data Set and Benchmark Results

In this paper, automated user verification techniques for smartphones ar...
research
12/22/2017

An HMM-based behavior modeling approach for continuous mobile authentication

This paper studies continuous authentication for touch interface based m...
research
02/28/2018

WACA: Wearable-Assisted Continuous Authentication

One-time login process in conventional authentication systems does not g...
research
06/02/2021

A Continuous Liveness Detection System for Text-independent Speaker Verification

Voice authentication is drawing increasing attention and becomes an attr...
research
06/21/2020

Quickest Intruder Detection for Multiple User Active Authentication

In this paper, we investigate how to detect intruders with low latency f...
research
11/26/2017

Smartphone App Usage Prediction Using Points of Interest

In this paper we present the first population-level, city-scale analysis...

Please sign up or login with your details

Forgot password? Click here to reset