SwipePass

Author:

Chen Yongliang1,Ni Tao1,Xu Weitao1,Gu Tao2

Affiliation:

1. City University of Hong Kong Shenzhen Research Institute, Shenzhen, China and City University of Hong Kong, Hong Kong, China

2. Macquarie University, Sydney, Australia

Abstract

Pattern lock-based authentication has been widely adopted in modern smartphones. However, this scheme relies essentially on passwords, making it vulnerable to various side-channel attacks such as the smudge attack and the shoulder-surfing attack. In this paper, we propose a second-factor authentication system named SwipePass, which authenticates a smartphone user by examining the distinct physiological and behavioral characteristics embedded in the user's pattern lock process. By emitting and receiving modulated audio using the built-in modules of the smartphone, SwipePass can sense the entire unlocking process and extract discriminative features to authenticate the user from the signal variations associated with hand dynamics. Moreover, to alleviate the burden of data collection in the user enrollment phase, we conduct an in-depth analysis of users' behaviors under different conditions and propose two augmentation techniques to significantly improve identification accuracy even when only a few training samples are available. Finally, we design a robust authentication model based on CNN-LSTM and One-Class SVM for user identification and spoofer detection. We implement SwipePass on three off-the-shelf smartphones and conduct extensive evaluations in different real-world scenarios. Experiments involving 36 participants show that SwipePass achieves an average identification accuracy of 96.8% while maintaining a false accept rate below 0.45% against various attacks.

Funder

Changsha International and Regional Science and Technology Cooperation Program

National Natural Science Foundation of China

Shenzhen Science and Technology Funding Fundamental Research Program

Natural Science Foundation of Shandong Province

Research Grants Council of the Hong Kong Special Administrative Region, China

City University of Hong Kong

Chow Sang Sang Holdings International Limited

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference47 articles.

1. 2014. How to Fool a Fingerprint Security System As Easy As ABC. https://www.instructables.com/How-To-Fool-a-Fingerprint-Security-System-As-Easy-/. 2014. How to Fool a Fingerprint Security System As Easy As ABC. https://www.instructables.com/How-To-Fool-a-Fingerprint-Security-System-As-Easy-/.

2. 2017. Galaxy S8 face recognition already defeated with a simple picture. https://arstechnica.com/gadgets/2017/03/video-shows-galaxy-s8-face-recognition-can-be-defeated-with-a-picture/. 2017. Galaxy S8 face recognition already defeated with a simple picture. https://arstechnica.com/gadgets/2017/03/video-shows-galaxy-s8-face-recognition-can-be-defeated-with-a-picture/.

3. Alibaba. 2022. Alipay. https://intl.alipay.com. Alibaba. 2022. Alipay. https://intl.alipay.com.

4. Julio Angulo and Erik Wästlund . 2011. Exploring touch-screen biometrics for user identification on smart phones . In Privacy and Identity Management for Life . Springer , 130--143. Julio Angulo and Erik Wästlund. 2011. Exploring touch-screen biometrics for user identification on smart phones. In Privacy and Identity Management for Life. Springer, 130--143.

5. Smudge attacks on smartphone touch screens;Aviv Adam J;Woot,2010

Cited by 12 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. MaP-SGAN: Multi-anchor point siamese GAN for Wi-Fi CSI-based cross-domain gait recognition;Expert Systems with Applications;2024-10

2. Sensor Security in Virtual Reality: Exploration and Mitigation;Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services;2024-06-03

3. SigningRing: Signature-based Authentication using Inertial Sensors on a Ring Form-factor;Proceedings of the Workshop on Body-Centric Computing Systems;2024-06-03

4. RF-Egg: An RF Solution for Fine-Grained Multi-Target and Multi-Task Egg Incubation Sensing;Proceedings of the 30th Annual International Conference on Mobile Computing and Networking;2024-05-29

5. EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing;2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT);2024-05-13

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3