
(on very few samples) and that they provide resistance
against an active attacker who observed (and heard)
the victim’s gestures.
ACKNOWLEDGEMENTS
This work was supported financially by Master-
card; the Engineering and Physical Sciences Research
Council [grant number EP/P00881X/1]; and the PE-
TRAS National Centre of Excellence for IoT Systems
Cybersecurity [grant number EP/S035362/1]. The au-
thors would like to thank these organisations for their
support and Genki Instruments for their collaboration
and technical support.
REFERENCES
Acar, A., Aksu, H., Uluagac, A. S., and Akkaya, K. (2020).
A usable and robust continuous authentication frame-
work using wearables. In IEEE Transactions on Mo-
bile Computing (TMC).
Ciuffo, F. and Weiss, G. M. (2017). Smartwatch-based
transcription biometrics. In IEEE Annual Ubiqui-
tous Computing, Electronics & Mobile Communica-
tion Conference.
Griswold-Steiner, I., Matovu, R., and Serwadda, A. (2017).
Handwriting watcher: A mechanism for smartwatch-
driven handwriting authentication. In IEEE Interna-
tional Joint Conference on Biometrics (IJCB).
Griswold-Steiner, I., Matovu, R., and Serwadda, A. (2019).
Wearables-driven freeform handwriting authentica-
tion. In IEEE Transactions on Biometrics, Behavior,
and Identity Science.
Huhta, O., Shrestha, P., Udar, S., Juuti, M., Saxena, N.,
and Asokan, N. (2016). Pitfalls in designing zero-
effort deauthentication: Opportunistic human obser-
vation attacks. In Network and Distributed System Se-
curity Symposium (NDSS).
Johnston, A. H. and Weiss, G. M. (2015). Smartwatch-
based biometric gait recognition. In IEEE Inter-
national Conference on Biometrics Theory, Applica-
tions, and Systems (BTAS).
Lee, W. H. and Lee, R. B. (2016). Implicit sensor-based
authentication of smartphone users with smartwatch.
In ACM Hardware and Architectural Support for Se-
curity and Privacy (HASP).
Liang, G. C., Xu, X. Y., and Yu, J. D. (2017). User authen-
tication on wearable devices based on punch gesture
biometrics. In International Conference on Informa-
tion Science and Technology.
Liang, X. and Kotz, D. (2017). Authoring: Wearable user-
presence authentication. In ACM Workshop on Wear-
able Systems and Applications (WearSys).
Mare, S., Markham, A. M., Cornelius, C., Peterson, R., and
Kotz, D. (2014). Zebra: Zero-effort bilateral recurring
authentication. In IEEE Symposium on Security and
Privacy (S&P).
Mare, S., Rawassizadeh, R., Peterson, R., and Kotz, D.
(2019). Continuous smartphone authentication using
wristbands. In Workshop on Usable Security and Pri-
vacy (USEC).
Nassi, B., Levy, A., Elovici, Y., and Shmueli, E. (2016).
Handwritten signature verification using hand-worn
devices. In ACM Interactive, Mobile, Wearable and
Ubiquitous Technologies (IMWUT).
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P.,
Weiss, R., Dubourg, V., Vanderplas, J., Passos, A.,
Cournapeau, D., Brucher, M., Perrot, M., and Duch-
esnay, E. (2011). Scikit-learn: Machine learning in
python. In Journal of Machine Learning Research.
Roshandel, M., Munjal, A., Moghadam, P., Tajik, S., and
Ketabdar, H. (2014). Multi-sensor finger ring for
authentication based on 3d signatures. In Human
Computer Interaction. Advanced Interaction Modal-
ities and Techniques.
Sen, S. and Kotz, D. (2020). Vibering: Using vibrations
from a smart ring as an out-of-band channel for shar-
ing secret keys. In Journal of Pervasive and Mobile
Computing.
Shrestha, B., Mohamed, M., Tamrakar, S., and Saxena, N.
(2016). Theft-resilient mobile wallets: Transrgess-
parently authenticating nfc users with tapping gesture
biometrics. In Annual Conference on Computer Secu-
rity Applications (ACSAC).
Sturgess, J. (2023). Ringauth dataset. In University of Ox-
ford, DOI: 10.5287/ora-no9q44mzq.
Sturgess, J., Eberz, S., Sluganovic, I., and Martinovic, I.
(2022a). Inferring user height and improving imper-
sonation attacks in mobile payments using a smart-
watch. In IEEE International Conference on Perva-
sive Computing and Communication Workshops (Per-
Com Workshops).
Sturgess, J., Eberz, S., Sluganovic, I., and Martinovic, I.
(2022b). Watchauth: User authentication and intent
recognition in mobile payments using a smartwatch.
In IEEE European Symposium on Security and Pri-
vacy (EuroS&P).
Wijewickrama, R., Maiti, A., and Jadliwala, M. (2021).
Write to know: On the feasibility of wrist motion
based user-authentication from handwriting. In ACM
Conference on Security and Privacy in Wireless and
Mobile Networks (WiSec).
Yang, J., Li, Y., and Xie, M. (2015). Motionauth: Motion-
based authentication for wrist worn smart devices. In
IEEE International Conference on Pervasive Comput-
ing and Communication Workshops (PerCom Work-
shops).
Yu, X., Zhou, Z., Xu, M., You, X., and Li, X. (2020). Thum-
bup: Identification and authentication by smartwatch
using simple hand gestures. In IEEE International
Conference on Pervasive Computing and Communi-
cations (PerCom).
RingAuth: User Authentication Using a Smart Ring
107