Learn More
We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different users populate distinct subspaces of this feature space. In a systematic experiment(More)
The dawn of the personal computer era gave birth to a new type of criminal, the hacker. Today there is a new even more attractive target for hackers to exploit, the Android smartphones. These devices allow us to use internet, camera, GPS tracking, and more features. Smartphones also contain detailed records of our contacts and SMS. The hacker then uses(More)
  • 1