Secure Pick Up: Implicit Authentication When You Start Using the Smartphone

@article{Lee2017SecurePU,
  title={Secure Pick Up: Implicit Authentication When You Start Using the Smartphone},
  author={Wei-Han Lee and Xiaochen Liu and Yilin Shen and Hongxia Jin and Ruby B. Lee},
  journal={ArXiv},
  year={2017},
  volume={abs/1708.09366}
}
We propose Secure Pick Up (SPU), a convenient, lightweight, in-device, non-intrusive and automatic-learning system for smartphone user authentication. Operating in the background, our system implicitly observes users' phone pick-up movements, the way they bend their arms when they pick up a smartphone to interact with the device, to authenticate the users. Our SPU outperforms the state-of-the-art implicit authentication mechanisms in three main aspects: 1) SPU automatically learns the user's… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 15 CITATIONS

ICAuth: Implicit and Continuous Authentication When the Screen Is Awake

  • ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
  • 2019
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

The Authentication Dilemma

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Novel Mobilephone Application Authentication Approach based on Accelerometer and Gyroscope Data

  • 2018 International Conference of the Biometrics Special Interest Group (BIOSIG)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Body-Taps: Authenticating Your Device Through Few Simple Taps

  • 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

Continuous Authentication of Smartphones Based on Application Usage

  • IEEE Transactions on Biometrics, Behavior, and Identity Science
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users

  • 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
  • 2018
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-7 OF 7 REFERENCES

SenSec: Mobile security through passive sensing

Jiang Zhu, Pang Wu, Xiao Wang, Joy Zhang
  • 2013 International Conference on Computing, Networking and Communications (ICNC)
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets

  • 2013 27th International Conference on Advanced Information Networking and Applications Workshops
  • 2013
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm

  • 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • 2012
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL