skip to main content
10.1145/2500423.2500434acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it

Published:30 September 2013Publication History

ABSTRACT

With the rich functionalities and enhanced computing capabilities available on mobile computing devices with touch screens, users not only store sensitive information (such as credit card numbers) but also use privacy sensitive applications (such as online banking) on these devices, which make them hot targets for hackers and thieves. To protect private information, such devices typically lock themselves after a few minutes of inactivity and prompt a password/PIN/pattern screen when reactivated. Passwords/PINs/patterns based schemes are inherently vulnerable to shoulder surfing attacks and smudge attacks. Furthermore, passwords/PINs/patterns are inconvenient for users to enter frequently. In this paper, we propose GEAT, a gesture based user authentication scheme for the secure unlocking of touch screen devices. Unlike existing authentication schemes for touch screen devices, which use what user inputs as the authentication secret, GEAT authenticates users mainly based on how they input, using distinguishing features such as finger velocity, device acceleration, and stroke time. Even if attackers see what gesture a user performs, they cannot reproduce the behavior of the user doing gestures through shoulder surfing or smudge attacks. We implemented GEAT on Samsung Focus running Windows, collected 15009 gesture samples from 50 volunteers, and conducted real-world experiments to evaluate GEAT's performance. Experimental results show that our scheme achieves an average equal error rate of 0.5% with 3 gestures using only 25 training samples.

References

  1. "25 leaked celebrity cell phone pics," http://www.holytaco.com/25-leaked-celebrity-cell-phone-pics.Google ScholarGoogle Scholar
  2. "The symantec smartphone honey stick project,"Google ScholarGoogle Scholar
  3. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens," in Proc. 4th USENIX Conf. on Offensive technologies, 2010, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C.-C. Chang and C.-J. Lin, "LIBSVM: a library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, pp. 27:1--27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Conti, I. Zachia-Zlatea, and B. Crispo, "Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call," in Proc. ACM Symposium on Information, Computer and Communications Security, 2011, pp. 249--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Gafurov, K. Helkala, and T. Søndrol, "Biometric gait authentication using accelerometer sensor," Journal of computers, vol. 1, no. 7, pp. 51--59, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Joe H. Ward, "Hierarchical grouping to optimize an objective function," Journal of the American statistical association, vol. 58, no. 301, pp. 236--244, 1963.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. S. Keerthi and C.-J. Lin, "Asymptotic behaviors of support vector machines with gaussian kernel," Neural computation, vol. 15, no. 7, pp. 1667--1689, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. D. Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, "Touch me once and I know it's you!: implicit authentication based on touch screen patterns," in Proc. ACM (SIGCHI), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Killourhy and R. Maxion, "Why did my detector do that?!" in Proc. RAID, 2010.Google ScholarGoogle Scholar
  11. J. Kwapisz, G. Weiss, and S. Moore, "Cell phone-based biometric identification," in Proc. IEEE Int. Conf. on Biometrics: Theory Applications and Systems, 2010, pp. 1--7.Google ScholarGoogle Scholar
  12. J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. Makela, and H. Ailisto, "Identifying users of portable devices from gait pattern with accelerometers," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, 2005.Google ScholarGoogle Scholar
  13. F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. In Proc. ACM CCS, pages 73--82, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon. Biometric-rich gestures: a novel approach to authentication on multi-touch device. In Proc. ACM SIGCHI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Schaub, R. Deyhle, and M. Weber, "Password entry usability and shoulder surfing susceptibility on different smartphone platforms," in Proc. Mobile & Ubiquitous Multimedia, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Scholkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, "Estimating the support of a high-dimensional distribution," Neural computation, vol. 13, no. 7, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Shahzad, S. Zahid, and M. Farroq, "A hybrid GA-PSO fuzzy system for user identification on smart phones," in Proc. GECCO, 2009, pp. 1617--1624. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. Tari, A. Ozok, and S. Holden, "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords," in Proc. SOUPS, 2006, pp. 56--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, "Keystroke-based user identification on smart phones," in Proc. RAID, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. Zheng, K. Bai, H. Huang, and H. Wang. You are how you touch: User verification on smartphones via tapping behaviors. Technical report, College of William and Mary, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
        September 2013
        504 pages
        ISBN:9781450319997
        DOI:10.1145/2500423

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 September 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        MobiCom '13 Paper Acceptance Rate28of207submissions,14%Overall Acceptance Rate440of2,972submissions,15%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader