loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Gerardo Canfora 1 ; Paolo di Notte 2 ; Francesco Mercaldo 3 and Corrado Aaron Visaggio 1

Affiliations: 1 University of Sannio, Italy ; 2 Reply, Italy ; 3 University of Sannio and Centro Regionale Information Communication Technology - CeRICT scrl, Italy

ISBN: 978-989-758-196-0

Keyword(s): Continuous Authentication, Silent Authentication, Security, Behavioral Models, Android.

Related Ontology Subjects/Areas/Topics: Biometrics Security and Privacy ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Security and Privacy in Mobile Systems

Abstract: Due to the increasing pervasiveness of mobile technologies, sensitive user information is often stored on mobile devices. Nowadays, mobile devices do not continuously verify the identity of the user while sensitive activities are performed. This enables attackers full access to sensitive data and applications on the device, if they obtain the password or grab the device after login. In order to mitigate this risk, we propose a continuous and silent monitoring process based on a set of features: orientation, touch and cell tower. The underlying assumption is that the features are representative of smartphone owner behaviour and this is the reason why the features can be useful to discriminate the owner by an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.85.92.139

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Canfora, G.; di Notte, P.; Mercaldo, F. and Visaggio, C. (2016). Silent and Continuous Authentication in Mobile Environment.In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 97-108. DOI: 10.5220/0005965500970108

@conference{secrypt16,
author={Gerardo Canfora. and Paolo di Notte. and Francesco Mercaldo. and Corrado Aaron Visaggio.},
title={Silent and Continuous Authentication in Mobile Environment},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={97-108},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005965500970108},
isbn={978-989-758-196-0},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Silent and Continuous Authentication in Mobile Environment
SN - 978-989-758-196-0
AU - Canfora, G.
AU - di Notte, P.
AU - Mercaldo, F.
AU - Visaggio, C.
PY - 2016
SP - 97
EP - 108
DO - 10.5220/0005965500970108

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.