|
[1] Steven Furnell, Nathan Clarke, and Sevasti Karatzouni. Beyond the pin: En- hancing user authentication for mobile devices. Computer fraud & security, 2008(8):12–17, 2008. [2] Carole Theriault. Survye says 70 percentages don’t password-protect mobiles : download free mobile toolkit. http://nakedsecurity.sophos.com/2011/08/ 09/free-sophos-mobile-security-toolkit/, 2011. [3] Amy K Karlson, AJ Brush, and Stuart Schechter. Can i borrow your phone?: understanding concerns when sharing mobile phones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1647– 1650. ACM, 2009. [4] Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Kon- stantin Beznosov. Know your enemy: the risk of unauthorized access in smart- phones by insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 271–280. ACM, 2013. [5] Lorrie Faith Cranor. Security and usability: designing secure systems that people can use. ” O’Reilly Media, Inc.”, 2005. [6] S Karatzouni, SM Furnell, NL Clarke, and RA Botha. Perceptions of user authentication on mobile devices. In Proceedings of the ISOneWorld Conference, Las Vegas, USA, April, pages 11–13, 2007. 34 [7] Hojin Seo, Eunjin Kim, and Huy Kang Kim. A novel biometric identification based on a users input pattern analysis for intelligent mobile devices. Interna- tional Journal of Advanced Robotic Systems, 9, 2012. [8] Yi Guo, Lei Yang, Xuan Ding, Jinsong Han, and Yunhao Liu. Opensesame: Unlocking smart phone through handshaking biometrics. In INFOCOM, 2013 Proceedings IEEE, pages 365–369. IEEE, 2013. [9] Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, and Xinwen Fu. Fingerprint attack against touch-enabled devices. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pages 57–68. ACM, 2012. [10] Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. Smudge attacks on smartphone touch screens. WOOT, 10:1–7, 2010. [11] Arash Habibi Lashkari, Samaneh Farmand, Dr Zakaria, Omar Bin, Dr Saleh, et al. Shoulder surfing attack in graphical password authentication. arXiv preprint arXiv:0912.0951, 2009. [12] Cheng Bo, Lan Zhang, Xiang-Yang Li, Qiuyuan Huang, and Yu Wang. Silentsense: Silent user identification via touch and movement behavioral bio- metrics. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, MobiCom ’13, pages 187–190, New York, NY, USA, 2013. ACM. [13] Anil K Jain, Arun Ross, and Salil Prabhakar. An introduction to biometric recognition. Circuits and Systems for Video Technology, IEEE Transactions on, 14(1):4–20, 2004. [14] Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX conference on Hot topics in security, pages 9–9. USENIX Association, 2009. 35 [15] Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. Implicit authen- tication through learning user behavior. In Information Security, pages 99–113. Springer, 2011. [16] Nan Zheng, Kun Bai, Hai Huang, and Haining Wang. You are how you touch: User verification on smartphones via tapping behaviors. Technical report, Tech. Rep. WM-CS-2012-06, 2012. [17] Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos. Pro- gressive authentication: Deciding when to authenticate on mobile phones. In USENIX Security Symposium, pages 301–316, 2012. [18] Heather Crawford, Karen Renaud, and Tim Storer. A framework for continu- ous, transparent mobile device authentication. Computers & Security, 39:127– 136, 2013. [19] Koji Iwano, Tomoharu Hirose, Eigo Kamibayashi, and Sadaoki Furui. Audio- visual person authentication using speech and ear images. In Workshop on Multimodal User Authentication (MMUA 2003), pages 85–90, 2003. [20] Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Acces- sory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012. [21] Liang Cai and Hao Chen. Touchlogger: Inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011. [22] Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services, pages 323–336. ACM, 2012. [23] Ron Kohavi. The power of decision tables. In Machine Learning: ECML-95, pages 174–189. Springer, 1995. 36 [24] The University of WAIKATO. Weka 3: Data mining software in java. http: //weka.wikispaces.com, 2012. [25] rjmarsan. Weka for android. https://github.com/rjmarsan/ Weka-for-Android, Feb 2011. |