skip to main content
10.1145/3139243.3139251acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

VeriNet: User Verification on Smartwatches via Behavior Biometrics

Authors Info & Claims
Published:06 November 2017Publication History

ABSTRACT

No longer reserved for nerdy geeks, nowadays smartwatches have gain their popularities rapidly, and become one of the most desirable gadgets that the general public would like to own. However, such popularity also introduces potential vulnerability. Until now, the de facto solution to protect smartwatches are passwords, i.e. either PINs or Android Pattern Locks (APLs). Unfortunately, those types of passwords are not robust against various forms of attacks, such as shoulder surfing or touch/motion based side channel attacks. In this paper, we propose a novel authentication approach for smartwatches, which adds another layer of security on top of the traditional passwords by considering the unique motion signatures when different users input passwords on their watches. It uses a deep recurrent neural networks to analyse the subtle motion signals of password input, and distinguish the legitimate users from malicious impostors. Following a privacy-preserving manner, our proposed approach does not require users to upload their passcodes for model training but only the motion data and identity labels. Extensive experiments on large-scale datasets collected real-world show that the proposed approach outperforms the state-of-the-art significantly, even in the most challenging case where a user has multiple distinct passcodes.

References

  1. Ltd Alipay.com Co. 2017. Alipay - Makes Life Easy. https://itunes.apple.com/us/app/alipay-makes-life-easy/id333206289?mt=8. (2017).Google ScholarGoogle Scholar
  2. Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies, Woot (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. James Bergstra, Frédéric Bastien, Olivier Breuleux, Pascal Lamblin, Razvan Pascanu, Olivier Delalleau, Guillaume Desjardins, David Warde-Farley, Ian Goodfellow, Arnaud Bergeron, et al. 2011. Theano: Deep learning on gpus with python. In NIPS 2011, BigLearning Workshop, Granada, Spain, Vol. 3.Google ScholarGoogle Scholar
  4. Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. François Chollet et al. 2015. Keras: Deep learning library for theano and tensor-flow. URL: https://keras.io/k (2015).Google ScholarGoogle Scholar
  6. Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (CHI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dinei Florêncio, Cormac Herley, and Paul C Van Oorschot. 2014. passcode Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.. In USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The anatomy of smartphone unlocking: A field study of android lock screens. In ACM Conference on Human Factors in Computing Systems, CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sepp Hochreiter, Yoshua Bengio, Paolo Frasconi, and Jürgen Schmidhuber. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies. (2001).Google ScholarGoogle Scholar
  11. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. 9, 8 (1997), 1735--1780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Haiming Jin, Lu Su, Houping Xiao, and Klara Nahrstedt. 2016. INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems.. In MobiHoc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. In International Conference on Learning Representations, ICLR.Google ScholarGoogle Scholar
  14. Lingjun Li, Xinxin Zhao, and Guoliang Xue. 2013. Unobservable Reauthentication for Smartphones.. In NDSS.Google ScholarGoogle Scholar
  15. Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, and Kui Ren. 2015. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In SenSys. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. 2012. ACCessory: passcode inference using accelerometers on smartphones. In HotMobile. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Muhammad Shahzad, Alex X Liu, and Arjmand Samuel. 2013. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In Proceedings of the 19th annual international conference on Mobile computing & networking, (MobiCom). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Elizabeth Stobert and Robert Biddle. 2014. The passcode life cycle: user behaviour in managing passcodes. In USENIX Symposium On Usable Privacy and Security.Google ScholarGoogle Scholar
  19. Zhi Xu, Kun Bai, and Sencun Zhu. 2012. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hongji Yang, Lin Chen, Kaigui Bian, Yang Tian, Fan Ye, Wei Yan, Tong Zhao, and Xiaoming Li. 2015. TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passcodes. In IEEE International Conference on Communications, (ICC).Google ScholarGoogle ScholarCross RefCross Ref
  21. Shuochao Yao, Shaohan Hu, Yiran Zhao, Aston Zhang, and Tarek Abdelzaher. 2017. Deepsense: A unified deep learning framework for time-series mobile sensing data processing. In International Conference on World Wide Web, WWW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Nan Zheng, Kun Bai, Hai Huang, and Haining Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In IEEE 22nd International Conference on Network Protocols (ICNP). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. VeriNet: User Verification on Smartwatches via Behavior Biometrics

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CrowdSenSys '17: Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications
        November 2017
        81 pages
        ISBN:9781450355551
        DOI:10.1145/3139243

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 November 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader