CORMORANT

Author:

Hintze Daniel1,Füller Matthias2,Scholz Sebastian2,Findling Rainhard D.3,Muaaz Muhammad4,Kapfer Philipp1,Koch Eckhard2,Mayrhofer René1

Affiliation:

1. Institute of Networks and Security, Johannes Kepler University Linz, Linz, Austria

2. FHDW University of Applied Sciences Paderborn, Paderborn, Germany

3. Department of Communications and Networking, Aalto University, Espoo, Finland

4. University of Agder, Grimstad, Norway

Abstract

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication. Transparent behavioral and physiological biometrics like gait, voice, face, and keystroke dynamics are used to continuously evaluate the user's identity without explicit interaction. The required level of confidence in the user's identity is dynamically adjusted based on the risk of unauthorized access derived from signals like location, time of day and nearby devices. Authentication results are shared securely with trusted devices to facilitate cross-device authentication for co-located devices. Conducting a large-scale agent-based simulation of 4 000 users based on more than 720 000 days of real-world device usage traces and 6.7 million simulated robberies and thefts sourced from police reports, we found the proposed approach is able to reduce the frequency of password entries required on smartphones by 97.82% whilst simultaneously reducing the risk of unauthorized access in the event of a crime by 97.72%, compared to conventional knowledge-based authentication.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Cited by 14 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. AI-powered biometrics for Internet of Things security: A review and future vision;Journal of Information Security and Applications;2024-05

2. MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android;ACM Transactions on Privacy and Security;2024-04-08

3. CrossGAI;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2024-03-06

4. SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems;Computers & Security;2024-02

5. WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism;Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology;2023-10-29

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3