Abstract
In recent years, mobile devices have become the mainstream medium for maintaining and processing a variety of information, including personal or sensitive information. To prevent a leakage of information to unauthorized users, a user authentication scheme that is appropriate for mobile environment is surely needed. In the meantime, it is important to guarantee sufficient usability of the mechanism so that it does not affect the user experience of the mobile device in a significant way. To pursue both usability and security perspectives of mobile devices, we propose a novel way of user authentication where fine-grained user behaviors are exploited to prohibit unauthorized access from an adversarial user. We examine behavioral patterns of daily usage of mobile devices in very fine-grained and implicit fashion. As a result, we suggest and evaluate the overall system exploiting user behaviors to separate valid user and adversarial user.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hayashi, E., Riva, O., Strauss, K., Brush, A.J.B., Schechter, S.: Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 2:1–2:11. ACM, New York (2012)
Siciliano, R.: More Than 30% of People Dont Password Protect Their Mobile Devices (2013), http://blogs.mcafee.com/consumer/unprotected-mobile-devices
De Luca, A., et al.: Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 987–996. ACM, New York (2012)
Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 249–259. ACM, New York (2011)
Nicholson, A., Corner, M., Noble, B.: Mobile device security using transient authentication. IEEE Transactions on Mobile Computing 5(11), 1489–1502 (2006)
Seifert, J., et al.: Treasurephone: Context-sensitive user data protection on mobile phones. In: Floréen, P., Krüger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol. 6030, pp. 130–137. Springer, Heidelberg (2010)
Trewin, S., et al.: Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 159–168. ACM, New York (2012)
Shi, E., et al.: Implicit authentication through learning user behavior. In: Burmester, M., et al. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)
Ni, X., Yang, Z., Bai, X., Champion, A., Xuan, D.: Diffuser: Differentiated user access control on smartphones. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS 2009, pp. 1012–1017 (2009)
Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 15. USENIX Association, Berkeley (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Y., Kwon, O., Kim, S., Jeong, B., Yoon, H. (2014). Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_63
Download citation
DOI: https://doi.org/10.1007/978-3-642-41674-3_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41673-6
Online ISBN: 978-3-642-41674-3
eBook Packages: EngineeringEngineering (R0)