skip to main content
10.1145/2800835.2800906acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
poster

Cormorant: towards continuous risk-aware multi-modal cross-device authentication

Published: 07 September 2015 Publication History

Abstract

Nowadays, people own and carry an increasing number of mobile devices, such as smartphones and smartwatches. Since these devices store and provide access to sensitive information, authentication is required to prevent unauthorized access. Widely used mechanisms like PIN and password, however, don't scale well with the growing number of devices and interactions. We present the preliminary design of Cormorant, an extensible, risk-aware, multi-modal, crossdevice authentication framework that enables transparent continuous authentication using different biometrics across multiple trusted devices.

References

[1]
Kyle O. Bailey, James S. Okolica, and Gilbert L. Peterson. 2014. User identification and authentication using multi-modal behavioral biometrics. Computers and Security 43 (2014), 77--89.
[2]
Findling, Rainhard D and Rene Mayrhofer. 2013. Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications (2013), 190--208.
[3]
Daniel Hintze, Rainhard D Findling, Sebastian Scholz, and René Mayrhofer. 2014. Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. In Proceedings of MoMM 2014.
[4]
Christopher G. Hocking, Steven M. Furnell, Nathan L. Clarke, and Paul L. Reynolds. 2011. Authentication Aura - A distributed approach to user authentication. Information Assurance and Security 6, 2 (2011).
[5]
Adam Hurkala and Jaroslaw Hurkala. 2014. Architecture of Context-Risk-Aware Authentication System for Web Environments. ICIEIS'2014 (2014), 219--228.
[6]
Soumik Mondal and Patrick Bours. 2015. A computational approach to the continuous authentication biometric system. Information Sciences 304 (2015), 28--53.
[7]
Muhammad Muaaz and Rene Mayrhofer. 2014. Orientation Independent Cell Phone Based Gait Authentication. Proceedings of MoMM 2014 (2014).
[8]
P. S. Sanjekar and J. B. Patil. 2013. An Overview of Multimodal Biometrics. Signal & Image Processing (SIPIJ) 4, 1 (2013), 57--64.
[9]
Frank Stajano. 2011. Pico: No more passwords! Lecture Notes in Computer Science 7114 LNCS (2011), 49--81.

Cited By

View all
  • (2022)Risk-Based AuthenticationHandbook of Research on Mathematical Modeling for Smart Healthcare Systems10.4018/978-1-6684-4580-8.ch009(154-179)Online publication date: 24-Jun-2022
  • (2021)Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNsIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488846(1-10)Online publication date: 10-May-2021
  • (2019)CORMORANTProceedings of the 17th International Conference on Advances in Mobile Computing & Multimedia10.1145/3365921.3365923(117-126)Online publication date: 2-Dec-2019
  • Show More Cited By

Index Terms

  1. Cormorant: towards continuous risk-aware multi-modal cross-device authentication

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UbiComp/ISWC'15 Adjunct: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers
      September 2015
      1626 pages
      ISBN:9781450335751
      DOI:10.1145/2800835
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2015

      Check for updates

      Author Tags

      1. authentication
      2. biometrics
      3. risk assessment

      Qualifiers

      • Poster

      Conference

      UbiComp '15
      Sponsor:
      • Yahoo! Japan
      • SIGMOBILE
      • FX Palo Alto Laboratory, Inc.
      • ACM
      • Rakuten Institute of Technology
      • Microsoft
      • Bell Labs
      • SIGCHI
      • Panasonic
      • Telefónica
      • ISTC-PC

      Acceptance Rates

      Overall Acceptance Rate 764 of 2,912 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Risk-Based AuthenticationHandbook of Research on Mathematical Modeling for Smart Healthcare Systems10.4018/978-1-6684-4580-8.ch009(154-179)Online publication date: 24-Jun-2022
      • (2021)Towards Video Streaming Analysis and Sharing for Multi-Device Interaction with Lightweight DNNsIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488846(1-10)Online publication date: 10-May-2021
      • (2019)CORMORANTProceedings of the 17th International Conference on Advances in Mobile Computing & Multimedia10.1145/3365921.3365923(117-126)Online publication date: 2-Dec-2019
      • (2019)Hide my Gaze with EOG!Proceedings of the 17th International Conference on Advances in Mobile Computing & Multimedia10.1145/3365921.3365922(107-116)Online publication date: 2-Dec-2019
      • (2019)CORMORANTProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33512433:3(1-23)Online publication date: 9-Sep-2019
      • (2019)A Survey on Adaptive AuthenticationACM Computing Surveys10.1145/333611752:4(1-30)Online publication date: 11-Sep-2019
      • (2019)Cross-Device TaxonomyProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300792(1-28)Online publication date: 2-May-2019
      • (2017)A Large-Scale, Long-Term Analysis of Mobile Device Usage CharacteristicsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/30900781:2(1-21)Online publication date: 30-Jun-2017
      • (2017)TUM: Towards ubiquitous multi-device localization for cross-device interactionIEEE INFOCOM 2017 - IEEE Conference on Computer Communications10.1109/INFOCOM.2017.8057102(1-9)Online publication date: May-2017
      • (2017)Attribute-Based Privacy-Friendly Access Control with ContextE-Business and Telecommunications10.1007/978-3-319-67876-4_14(291-315)Online publication date: 28-Oct-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media