Protecting mobile devices from adversarial user by fine-grained analysis of user behavior

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, mobile devices have become the mainstream medium for maintaining and processing a variety of information, including personal or sensitive information. To prevent a leakage of information to unauthorized users, a user authentication scheme that is appropriate for mobile environment is surely needed. In the meantime, it is important to guarantee sufficient usability of the mechanism so that it does not affect the user experience of the mobile device in a significant way. To pursue both usability and security perspectives of mobile devices, we propose a novel way of user authentication where fine-grained user behaviors are exploited to prohibit unauthorized access from an adversarial user. We examine behavioral patterns of daily usage of mobile devices in very fine-grained and implicit fashion. As a result, we suggest and evaluate the overall system exploiting user behaviors to separate valid user and adversarial user. © 2014 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kim, Y., Kwon, O., Kim, S., Jeong, B., & Yoon, H. (2014). Protecting mobile devices from adversarial user by fine-grained analysis of user behavior. In Lecture Notes in Electrical Engineering (Vol. 279 LNEE, pp. 445–451). Springer Verlag. https://doi.org/10.1007/978-3-642-41674-3_63

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free