Skip to main content

Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

Abstract

In recent years, mobile devices have become the mainstream medium for maintaining and processing a variety of information, including personal or sensitive information. To prevent a leakage of information to unauthorized users, a user authentication scheme that is appropriate for mobile environment is surely needed. In the meantime, it is important to guarantee sufficient usability of the mechanism so that it does not affect the user experience of the mobile device in a significant way. To pursue both usability and security perspectives of mobile devices, we propose a novel way of user authentication where fine-grained user behaviors are exploited to prohibit unauthorized access from an adversarial user. We examine behavioral patterns of daily usage of mobile devices in very fine-grained and implicit fashion. As a result, we suggest and evaluate the overall system exploiting user behaviors to separate valid user and adversarial user.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hayashi, E., Riva, O., Strauss, K., Brush, A.J.B., Schechter, S.: Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 2:1–2:11. ACM, New York (2012)

    Google Scholar 

  2. Siciliano, R.: More Than 30% of People Dont Password Protect Their Mobile Devices (2013), http://blogs.mcafee.com/consumer/unprotected-mobile-devices

  3. De Luca, A., et al.: Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 987–996. ACM, New York (2012)

    Google Scholar 

  4. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 249–259. ACM, New York (2011)

    Google Scholar 

  5. Nicholson, A., Corner, M., Noble, B.: Mobile device security using transient authentication. IEEE Transactions on Mobile Computing 5(11), 1489–1502 (2006)

    Article  Google Scholar 

  6. Seifert, J., et al.: Treasurephone: Context-sensitive user data protection on mobile phones. In: Floréen, P., Krüger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol. 6030, pp. 130–137. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Trewin, S., et al.: Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 159–168. ACM, New York (2012)

    Google Scholar 

  8. Shi, E., et al.: Implicit authentication through learning user behavior. In: Burmester, M., et al. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Ni, X., Yang, Z., Bai, X., Champion, A., Xuan, D.: Diffuser: Differentiated user access control on smartphones. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, pp. 1012–1017 (2009)

    Google Scholar 

  10. Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 15. USENIX Association, Berkeley (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Y., Kwon, O., Kim, S., Jeong, B., Yoon, H. (2014). Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics