Thursday, September 6, 2012

Paper Reading #5: Touch me once and I know it's you! mplicit Authentication based on Touch Screen Patterns


Introduction:As most Android users know, the draw a shape password application is quick and easy to use. However, it is not as safe as one might assume. First off, an attacker could easily watch the phone owner enter the shape and then mimic the shape. Secondly, an attacker could simply look at the smudge patterns on the screen and decipher the password pattern. These are serious flaws with a pattern based password and in "Touch me once and I know it’s you! Implicit authentication based on touch screen patterns,” a research team attempts to address these issues.
Summary:Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann are from the University of Munich and are the researchers for this paper. The research team is attempting to differentiate between different users keying in the same pattern password. In addition, the team will use this ability to increase protection of pattern based passwords by checking for individual users’ identities. The team first observed user input information, such as speed, pressure, and path taken, on trivial tasks, such as horizontal swipe, vertical swipe, and horizontal swipe. Once they gathered this data, they began developing a security application that will incorporate these additional features into the existing pattern-based password programs. The research team will then perform another research experiment which will utilize the newly created program and test users and attackers input results. The categories that will be tracked are false negatives, true negatives, false positives, and true positives, which will then be used to calculate an overall accuracy rate.
 
Related Work:A lot of research has been done regarding biometric verification techniques, and I will name a few here. First, “Biometric verification at a self service interface” investigates the use of physiological biometrics to securely identify users. Second, a research team investigates “How biometrics will fuse flesh and machine,” which further investigates physiological biometric verification methods. Then, a research team investigates the user acceptance of biometric verification methods in “Employee acceptance of computerized biometrics security systems. Another paper that references user acceptance of biometric verification systems is “Theoretical examination of the effects of anxiety and electronic performance monitoring on biometric security systems.” Next, in “A user study using images for authentication” a research team studies using pictures for passwords all together. An application of a very specific physiological biometric test is used in “An iris biometric system for public and personal use.” In “An introduction to evaluating biometric systems,” researchers study the broad topic and application of physiological biometrics. “Bodycheck: Biometric access protection devices and their programs put to the test,” is a study in which a research team investigates both physiological and behavioral biometrics to improve security functions. A study of privacy and big brother syndrome is conducted in “Biometrics in the mainstream: what does the U.S. public think.” Finally, a team studies the benefit of picture password regarding memory in “The memorability and security of passwords – some empirical results.”
Evaluation:In order to evaluate the first part of the research, including the base information regarding touch pressure and speed, the team used quantitative objective methods. This allows the team to gather hard evidence of their hypothesis. Then, the team uses quantitative objective methods again when measuring the accuracy of the real users and attackers keying in the correct pattern password. The results of the experiment can be seen in the following chart.
True Positives
False Negatives
True Negatives
False Positives
Accuracy
398
92
852
231
77%
False Rejection Rate: 19%
False Acceptance Rate: 21%
Discussion:I believe that this research paper did a great job at investigating a cheap and logical solution to an everyday problem. The main difference between the related works and this study is the type of biometrics testing used.  Most of the studies investigate the idea of using physiological biometrics, such as finger prints and retina scans. Alternatively, this study investigates the use of behavioral physiological biometrics, such as pressure and speed. The main two benefits of these two approaches are 1) no additional hardware is required in addition to an Android smartphone and 2) no privacy questions come into play regarding the storage of physiological biometric identity information. The main problem that I see with this study is that a lot of times, multiple people use a phone. For example, friends and significant others know each other’s password patterns and this research paper does not account for this situation.

No comments:

Post a Comment