Forgery-Resistant Touch-based Authentication on Mobile Devices

@inproceedings{Gong2016ForgeryResistantTA,
  title={Forgery-Resistant Touch-based Authentication on Mobile Devices},
  author={N. Gong and M. Payer and R. Moazzezi and M. Frank},
  booktitle={ASIA CCS '16},
  year={2016}
}
  • N. Gong, M. Payer, +1 author M. Frank
  • Published in ASIA CCS '16 2016
  • Computer Science
  • Mobile devices store a diverse set of private user data and have gradually become a hub to control users' other personal Internet-of-Things devices. Access control on mobile devices is therefore highly important. The widely accepted solution is to protect access by asking for a password. However, password authentication is tedious, e.g., a user needs to input a password every time she wants to use the device. Moreover, existing biometrics such as face, fingerprint, and touch behaviors are… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 17 CITATIONS

    Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud

    VIEW 6 EXCERPTS
    CITES RESULTS, METHODS & BACKGROUND
    HIGHLY INFLUENCED

    A continuous user authentication scheme for mobile devices

    VIEW 1 EXCERPT
    CITES METHODS

    Body-Taps: Authenticating Your Device Through Few Simple Taps

    VIEW 1 EXCERPT
    CITES BACKGROUND

    PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Adversarial Touch Dynamics

    • Sean Curran securran
    • 2017

    References

    Publications referenced by this paper.

    When kids' toys breach mobile phone security

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL