System | Use case | Resource to be secured | Attacker model | Deployment scheme, location of enrollment | Deployment scheme, location of authentication | Algorithmic approach | Privacy measures Entries marked with * are considered to be misconceptions |
System response after failed authentication | Re-authentication strategie |
Mahfouz, A., Hamdy, A., Eldin, M. A., & Mahmoud, T. M. (2024). B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment. Pervasive and Mobile Computing, 101888. https://doi.org/10.1016/j.pmcj.2024.101888 | General smartphone | Client device | Access to client and compromised credentials | Server | Client | Classification | |||
Li, Y., Huang, Y., & Huang, H. (2024). FuMeAuth: Sensor-Based Continuous Authentication Using Fused Memory-Augmented Transformer Autoencoder. IEEE Internet of Things Journal, 1–1. https://doi.org/10.1109/JIOT.2024.3394437 | General smartphone | Client device | Access to client and compromised credentials | Server | Client | Anomaly detection | Lock the device | ||
Li, Y., Liu, L., Deng, S., Qin, H., El-Yacoubi, M. A., & Zhou, G. (2024). Memory-Augmented Autoencoder Based Continuous Authentication on Smartphones With Conditional Transformer GANs. IEEE Transactions on Mobile Computing, 23(5), 4467–4482. https://doi.org/10.1109/TMC.2023.3290834 | General smartphone | Client device | Access to client | Server | Client | Anomaly detection | Lock the device | Explicit Authentication | |
Alawami, M. A., Abuhmed, T., Abuhamad, M., & Kim, H. (2024). MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones. Pervasive and Mobile Computing, 101, 101922. https://doi.org/10.1016/j.pmcj.2024.101922 | General smartphone | Client device | Access to client | Server | Server | Anomaly detection | Lock the device | ||
Li, Y., Ouyang, C., & Huang, H. (2024). AEGANAuth: Autoencoder GAN-Based Continuous Authentication With Conditional Variational Autoencoder Generative Adversarial Network. IEEE Internet of Things Journal, 11(16), 27635–27650. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2024.3399549 | General mobile devices | Client device | Access to client and compromised credentials | Server | Client | Anomaly detection | Lock the device | Explicit Authentication | |
Lopez, J. M. E., Celdran, A. H., Esquembre, F., Perez, G. M., & Marin-Blazquez, J. G. (2023). CGAPP: A continuous group authentication privacy-preserving platform for industrial scene. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 78, 103622. https://doi.org/10.1016/j.jisa.2023.103622 | Smartphone app in enterprise environment | Client App | Unspecified | Client / Server | Client | Classification | Discussed but not implemented | Lock the device, report to the management, undo the last action | |
Fereidooni, H., Koenig, J., Rieger, P., Chilese, M., Goekbakan, B., Finke, M., Dmitrienko, A., & Sadeghi, A.-R. (2023). AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. Proceedings 2023 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium, San Diego, CA, USA. https://doi.org/10.14722/ndss.2023.23194 | General smartphone apps | Cloud resource | Access to client | Server | Server | Classification | Explicit Authentication | ||
Yang, H., Meng, X., Zhao, X., Wang, Y., Liu, Y., Kang, X., Shen, J., & Huang, W. (2023). CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. In COMPUTERS & SECURITY (Vol. 128). ELSEVIER ADVANCED TECHNOLOGY. https://doi.org/10.1016/j.cose.2023.103159 | Computer in in enterprise environment | Client device | Access to client | Server | Server | Anomaly detection | Lock the device, disconnect the network, shutdown the device | Explicit Authentication, help from administrator | |
Huh, J. H., Kwag, S., Kim, I., Popov, A., Park, Y., Cho, G., Lee, J., Kim, H., & Lee, C.-H. (2023). On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation. In PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT (Vol. 7, Issue 2). ASSOC COMPUTING MACHINERY. https://doi.org/10.1145/3596236 | General smartphone | Client device | Access to client and compromised credentials | Client | Client | Classification | Local processing | Lock the device | |
Zhang, J., Li, Z., Zhang, H., Zhang, W., Ling, Z., & Yang, M. (2023). Sensor-based implicit authentication through learning user physiological and behavioral characteristics. Computer Communications, 208, 244–255. https://doi.org/10.1016/j.comcom.2023.06.016 | General smartphone | Client device | Access to client | Client | Client | Anomaly detection | Local processing | Lock the device | Explicit Authentication |
Gan, W., Chen, X., Wang, W., Chen, L., Wu, J., Wang, X., He, X., & Wu, F. (2022). Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. In X. Sun, X. Zhang, Z. Xia, & E. Bertino (Eds.), Artificial Intelligence and Security (pp. 625–638). Springer International Publishing. https://doi.org/10.1007/978-3-031-06791-4_49 | General mobile devices and computer | Client device | Unspecified | Server | Server | Classification | Homomorphic encryption | temporary block the client, restrict permissions, block the client | Timeout |
Sahu, A. K., Sharma, S., & Raja, R. (2022). Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service. Computers and Electrical Engineering, 99, 107817. https://doi.org/10.1016/j.compeleceng.2022.107817 | Mobile devices in enterprise environment | Client device | Access to client and compromised credentials | Server | Server | Classification | Keeping biometric data in enterprise networks* | Reassess the authentication of the user | |
Stylios, I., Skalkos, A., Kokolakis, S., & Karyda, M. (2022). BioPrivacy: A behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. INFORMATION AND COMPUTER SECURITY, 30(5), 687–704. https://doi.org/10.1108/ICS-12-2021-0212 | General smartphone | Client device | Access to client and compromised credentials | Server | Server | Classification | |||
Stylios, I., Skalkos, A., Kokolakis, S., & Karyda, M. (2022). BioPrivacy: A behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. INFORMATION AND COMPUTER SECURITY, 30(5), 687–704. https://doi.org/10.1108/ICS-12-2021-0212 | Smartphone app in enterprise environment | Client App | Unspecified | Server | Server | Anomaly Detection / Classification | |||
Gupta, S., Kumar, R., Kacimi, M., & Crispo, B. (2022). IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones. Pattern Recognition Letters, 157, 8–15. https://doi.org/10.1016/j.patrec.2022.03.011 | General smartphone apps | Client App | Access to client | Client | Client | Anomaly detection | Local processing | Sign-off the applications on the smartphone | |
Monschein, D., Peregrina Perez, J. A., Piotrowski, T., Nochta, Z., Waldhorst, O. P., & Zirpins, C. (2021). Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous Authentication. 2021 IEEE Symposium on Computers and Communications (ISCC), 1–6. https://doi.org/10.1109/ISCC53001.2021.9631491 | Cryptocurrency exchange plattforms | Cloud resource | Compromised credentials | Server | Server | Classification | Format preserving encryption | ||
Monschein, D., & Waldhorst, O. P. (2021). SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web Applications. 2021 IEEE 46th Conference on Local Computer Networks (LCN), 281–286. https://doi.org/10.1109/LCN52139.2021.9524959 | General cloud service | Cloud resource | Compromised credentials | Server | Server | Classification | Discussed but not implemented | Backend denies actions or requests additional confirmations | |
Monschein, D., & Waldhorst, O. P. (2021). SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web Applications. 2021 IEEE 46th Conference on Local Computer Networks (LCN), 281–286. https://doi.org/10.1109/LCN52139.2021.9524959 | General cloud service | Cloud resource | Unspecified | Server | Server | Classification | |||
Hernández-Álvarez, L., de Fuentes, J. M., González-Manzano, L., & Hernández Encinas, L. (2021). SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recognition Letters, 147, 189–196. https://doi.org/10.1016/j.patrec.2021.04.013 | General smartphone | Client device | Access to client | Server | Server | Classification | Format preserving encryption | ||
Espín López, J. M., Huertas Celdrán, A., Marín-Blázquez, J. G., Esquembre, F., & Martínez Pérez, G. (2021). S3: An AI-Enabled User Continuous Authentication for Smartphones Based on Sensors, Statistics and Speaker Information. Sensors, 21(11), Article 11. https://doi.org/10.3390/s21113765 | General smartphone | Client App | Unspecified | Server | Server | Anomaly detection | Discussed but not implemented | ||
Labayen, M., Vea, R., Flórez, J., Aginako, N., & Sierra, B. (2021). Online Student Authentication and Proctoring System Based on Multimodal Biometrics Technology. IEEE Access, 9, 72398–72411. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3079375 | E-Learning plattforms | Cloud resource | Impersonation attack | Server | Server | Anomaly detection / Classification | Anonymize biometric data* | ||
Cola, G., Vecchio, A., & Avvenuti, M. (2021). Continuous authentication through gait analysis on a wrist-worn device. Pervasive and Mobile Computing, 78, 101483. https://doi.org/10.1016/j.pmcj.2021.101483 | Smartwatch | Client device | Access to client | Client | Client | Anomaly detection | Local processing | ||
Sanchez, P. M. S., Maimo, L. F., Celdran, A. H., & Perez, G. M. (2021). AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning. COMPUTERS & SECURITY, 103, 102168. https://doi.org/10.1016/j.cose.2020.102168 | Computer in in enterprise environment | Client device | Unspecified | Server | Server | Classification | Aggregation of features over time* | Lock the device | Explicit Authentication |
Acar, A., Aksu, H., Uluagac, A. S., & Akkaya, K. (2021). A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Transactions on Mobile Computing, 20(6), 2140–2153. https://doi.org/10.1109/TMC.2020.2974941 | Computer in in enterprise environment | Client device | Compromised credentials | Server | Server | Anomaly detection & Classification | Transmit features, not raw data* | Locke the device, alert management and security teams, notify user via e-mail | Explicit Authentication |
Acar, A., Aksu, H., Uluagac, A. S., & Akkaya, K. (2021). A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Transactions on Mobile Computing, 20(6), 2140–2153. https://doi.org/10.1109/TMC.2020.2974941 | General computer | Client device | Access to client | Server | Server | Anomaly detection | Noise tolerant template security | Lock the device | Explicit Authentication |
Acar, A., Ali, S., Karabina, K., Kaygusuz, C., Aksu, H., Akkaya, K., & Uluagac, S. (2021). A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. ACM Transactions on Privacy and Security, 24(4), 24:1-24:28. https://doi.org/10.1145/3464690 | Virtual Desktops | Cloud resource | Compromised credentials | Server | Server | Classification | Lock the deivce, log an alarm, notify the user via e-mail or text message | Explicit Authentication | |
Rocha, R., Carneiro, D., & Novais, P. (2021). Continuous authentication with a focus on explainability. In NEUROCOMPUTING (Vol. 423, pp. 697–702). ELSEVIER. https://doi.org/10.1016/j.neucom.2020.02.122 | General smartphone | Client device | Access to client and compromised credentials | Server | Server | Classificaion | Lock the device | Explicit Authentication | |
Buriro, A., Gupta, S., Yautsiukhin, A., & Crispo, B. (2021). Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme. In JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY (Vol. 93, Issue 9, pp. 989–1006). SPRINGER. https://doi.org/10.1007/s11265-021-01654-2 | General smartphone apps | Client App | Access to client and compromised credentials | Server | Server | Classification | Discussed but not implemented | Block activities | Propt for re-authentication |
Barlas, Y., Basar, O. E., Akan, Y., Isbilen, M., Alptekin, G. I., & Incel, O. D. (2020). DAKOTA: Continuous Authentication with Behavioral Biometrics in a Mobile Banking Application. 2020 5th International Conference on Computer Science and Engineering (UBMK), 1–6. https://doi.org/10.1109/UBMK50275.2020.9219365 | Online Banking | Client App | Unspecified | Server | Server | Anomaly detection | |||
Kašys, K., Dundulis, A., Vasiljevas, M., Maskeliūnas, R., & Damaševičius, R. (2020). BodyLock: Human Identity Recogniser App from Walking Activity Data. In O. Gervasi, B. Murgante, S. Misra, C. Garau, I. Blečić, D. Taniar, B. O. Apduhan, A. M. A. C. Rocha, E. Tarantino, C. M. Torre, & Y. Karaca (Eds.), Computational Science and Its Applications – ICCSA 2020 (pp. 307–319). Springer International Publishing. https://doi.org/10.1007/978-3-030-58802-1_23 | General smartphone | Client device | Access to client | Server | Server | Classification | Block access to data, inform the owner about the location of the device | ||
Xu, W., Shen, Y., Luo, C., Li, J., Li, W., & Zomaya, A. Y. (2020). Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding. Ad Hoc Networks, 107, 102218. https://doi.org/10.1016/j.adhoc.2020.102218 | Smartwatch | Client device | Access to client and compromised credentials | Client | Client | Anomaly detection | |||
Shrestha, P., & Saxena, N. (2020). Hacksaw: Biometric-free non-stop web authentication in an emerging world of wearables. Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 13–24. https://doi.org/10.1145/3395351.3399366 | General cloud service | Cloud resource | Compromised credentials | Server | Server | Classification | Not use privacy sensitive biometrics* | Restrict access, alert the user, de-authenticate the session | |
Liang, X., Zou, F., Li, L., & Yi, P. (2020). Mobile terminal identity authentication system based on behavioral characteristics. International Journal of Distributed Sensor Networks, 16(1), 1550147719899371. https://doi.org/10.1177/1550147719899371 | General smartphone apps | Client App | Access to client | Server | Server | Classification | Not use privacy sensitive biometrics* | Lock the device | Explicit Authentication |
Zhu, T., Qu, Z., Xu, H., Zhang, J., Shao, Z., Chen, Y., Prabhakar, S., & Yang, J. (2020). RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild. IEEE Transactions on Mobile Computing, 19(2), 466–483. IEEE Transactions on Mobile Computing. https://doi.org/10.1109/TMC.2019.2892440 | General mobile devices | Client device | Access to client and compromised credentials | Server | Server/Client | Classification | Discussed but not implemented | ||
Sánchez Sánchez, P. M., Huertas Celdrán, A., Fernández Maimó, L., Martínez Pérez, G., & Wang, G. (2019). Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. In G. Wang, A. El Saddik, X. Lai, G. Martinez Perez, & K.-K. R. Choo (Eds.), Smart City and Informatization (pp. 73–85). Springer. https://doi.org/10.1007/978-981-15-1301-5_7 | Computer in in enterprise environment | Client device | Unspecified | Server | Server | Classification | Aggregation of features over time* | Lock the device | |
Mainali, P., Shepherd, C., & Petitcolas, F. A. P. (2019). Privacy-Enhancing Context Authentication from Location-Sensitive Data. Proceedings of the 14th International Conference on Availability, Reliability and Security, 1–10. https://doi.org/10.1145/3339252.3340334 | General cloud service | Cloud resource | Unspecified | Server | Server | Anomaly detection | Hashing biometric data | ||
Li, Q., & Chen, H. (2019). CDAS: A Continuous Dynamic Authentication System. Proceedings of the 2019 8th International Conference on Software and Computer Applications, 447–452. https://doi.org/10.1145/3316615.3316691 | General smartphone | Client device | Unspecified | Server | Client | Classification | Issue a warning | ||
Mostafa, H., El-Ramly, M., Elkorany, A. M., & Shaban, H. (2019). Behavio2Auth: Sensor-based Behavior Biometric Authentication for Smartphones. Proceedings of the ArabWIC 6th Annual International Conference Research Track, 1–6. https://doi.org/10.1145/3333165.3333176 | General smartphone | Client device | Access to client | Client | Client | Anomaly detection | Local processing | Lock the device | Explicit Authentication |
Hintze, D., Füller, M., Scholz, S., Findling, R. D., Muaaz, M., Kapfer, P., Koch, E., & Mayrhofer, R. (2019). CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3), 85:1-85:23. https://doi.org/10.1145/3351243 | General mobile devices | Client device | Access to client | Unkown | Unkown | Unknown | Lock the device | Explicit Authentication | |
Wu, C., He, K., Chen, J., & Du, R. (2019). ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 1–6. https://doi.org/10.1109/ICC.2019.8761435 | General smartphone | Client device | Access to client and compromised credentials | Server | Client | Classification | - | ||
Pang, X., Yang, L., Liu, M., & Ma, J. (2019). MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. In J. Jang-Jaccard & F. Guo (Eds.), Information Security and Privacy (pp. 533–551). Springer International Publishing. https://doi.org/10.1007/978-3-030-21548-4_29 | General smartphone | Client device | Access to client | Client | Client | Anomaly detection | Local processing | Lock the device | Explicit Authentication |
Jorquera Valero, J. M., Sanchez Sanchez, P. M., Fernandez Maimo, L., Huertas Celdran, A., Arjona Fernandez, M., De Los Santos Vilchez, S., & Martinez Perez, G. (2018). Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System. SENSORS, 18(11), 3769. https://doi.org/10.3390/s18113769 | Mobile banking app | Client device | Unspecified | Client | Client | Anomaly detection | Local processing | Block the app, block sensitive data and transactions, allow limited payments only | |
Fenu, G., & Marras, M. (2018). Controlling User Access to Cloud-Connected Mobile Applications by Means of Biometrics. IEEE Cloud Computing, 5(4), 47–57. https://doi.org/10.1109/MCC.2018.043221014 | General cloud service | Cloud resource | Unspecified | Server | Server | Anomaly detection | Sign-off the session | ||
Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters, 113, 83–92. https://doi.org/10.1016/j.patrec.2017.03.027 | E-Learning plattforms | Cloud resource | Impersonation attack | Server | Server | Anomaly detection | |||
Shila, D. M., & Srivastava, K. (2018). CASTRA: Seamless and Unobtrusive Authentication of Users to Diverse Mobile Services. IEEE Internet of Things Journal, 5(5), 4042–4057. https://doi.org/10.1109/JIOT.2018.2851501 | General smartphone apps | Client App | Access to client | Server | Server | Anomaly detection | Using a random identifier* | Lock access to sensitive services | Active authentication foctur such as fingerprint, voice or faice |
Shepherd, C., Akram, R. N., & Markantonakis, K. (2017). Towards trusted execution of multi-modal continuous authentication schemes. Proceedings of the Symposium on Applied Computing, 1444–1451. https://doi.org/10.1145/3019612.3019652 | General computer | Client device | Access to client and compromised credentials (sholder surfing) | Client | Client | Classification | Local processing | ||
Centeno, M. P., Moorsel, A. V., & Castruccio, S. (2017). Smartphone Continuous Authentication Using Deep Learning Autoencoders. 2017 15th Annual Conference on Privacy, Security and Trust (PST), 147–1478. https://doi.org/10.1109/PST.2017.00026 | General smartphone | Client device | Unspecified | Server | Server | Anomaly detection | |||
Lee, W.-H., & Lee, R. B. (2017). Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning (arXiv:1708.09754). arXiv. http://arxiv.org/abs/1708.09754 | General smartphone | Client App | Access to client | Server | Client | Classification | Anonymize biometric data* | Lock the device | Explicit authentication, possibly with biometrics |
Schiavone, E., Ceccarelli, A., & Bondavalli, A. (2017). Continuous Biometric Verification for Non-Repudiation of Remote Services. Proceedings of the 12th International Conference on Availability, Reliability and Security, 1–10. https://doi.org/10.1145/3098954.3098969 | General cloud service | Cloud resource | Access to client | Server | Server | Unknown | |||
Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D., & de Faria Quinan, P. M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication. In I. Traoré, A. Awad, & I. Woungang (Eds.), Information Security Practices: Emerging Threats and Perspectives (pp. 73–81). Springer International Publishing. https://doi.org/10.1007/978-3-319-48947-6_6 | E-Learning plattforms | Cloud resource | Impersonation attack | Server | Server | Anomaly detection | |||
Lee, W.-H., & Lee, R. B. (2017). Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. 297–308. https://doi.org/10.1109/DSN.2017.24 | General smartphone apps | Client App | Access to client | Server | Client | Classification | Anonymize biometric data* | Lock the device, refuse access to security-critical data | Explicit Authentication |
Li, Q., Wang, L., Kim, T., & Im, E. G. (2016). Mobile-based continuous user authentication system for cloud security. 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), 176–179. https://doi.org/10.1109/ICNIDC.2016.7974559 | General cloud service | Cloud resource | Compromised credentials | Server | Server | Classification | Deny access to remote ressources | ||
Shahandashti, S. F., Safavi-Naini, R., & Safa, N. A. (2015). Reconciling user privacy and implicit authentication for mobile devices. Computers & Security, 53, 215–233. https://doi.org/10.1016/j.cose.2015.05.009 | General cloud service | Cloud resource | Access to client | Server | Server | Anomaly detection | Homomorphic encryption | Log out the user | Explicit Authentication |
Crouse, D., Han, H., Chandra, D., Barbello, B., & Jain, A. K. (2015). Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data. 2015 International Conference on Biometrics (ICB), 135–142. https://doi.org/10.1109/ICB.2015.7139043 | General smartphone | Client device | Access to client | Server | Server | Classification | Log out the user | ||
Feng, T., Yang, J., Yan, Z., Tapia, E. M., & Shi, W. (2014). TIPS: Context-aware implicit user identification using touch screen in uncontrolled environments. Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 1–6. https://doi.org/10.1145/2565585.2565592 | General smartphone apps | Client App | Unspecified | Client | Client | Anomaly detection | Local processing | Block access to application | Explicit Authentication |
Khan, H., Atwater, A., & Hengartner, U. (2014). Itus: An implicit authentication framework for android. Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 507–518. https://doi.org/10.1145/2639108.2639141 | General smartphone apps | Client App | Access to client | Client | Client | Unknown | Lock the application | Explicit Authentication with seperate credentials | |
Li, L., Zhao, X., & Xue, G. (2013). Unobservable Re-authentication for Smartphones. Network and Distributed System Security Symposium. https://www.semanticscholar.org/paper/Unobservable-Re-authentication-for-Smartphones-Li-Zhao/e86dd9e5ed2033cf7eab97245912b6d21c4c78a3 | General smartphone | Client device | Access to client | Client / Server | Client | Classification | Anonymize biometric data* | Lock the device, send message with location of the device to the user's e-mail | Administrator password |
Crawford, H., Renaud, K., & Storer, T. (2013). A framework for continuous, transparent mobile device authentication. In COMPUTERS & SECURITY (Vol. 39, Issue B, pp. 127–136). ELSEVIER ADVANCED TECHNOLOGY. https://doi.org/10.1016/j.cose.2013.05.005 | General smartphone apps | Client App | Access to client and compromised credentials | Client | Client | Classification | Local processing | Deny a desired task | Explicit Authentication |
Feng, T., Zhao, X., Carbunar, B., & Shi, W. (2013). Continuous Mobile Authentication Using Virtual Key Typing Biometrics. 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1547–1552. https://doi.org/10.1109/TrustCom.2013.272 | General smartphone | Client device | Access to client and compromised credentials | Client | Client | Unknown | Local processing | Lock out the user | |
Shi, W., Yang, J., Jiang, Y., Yang, F., & Xiong, Y. (2011). SenGuard: Passive user identification on smartphones using multiple sensors. 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 141–148. https://doi.org/10.1109/WiMOB.2011.6085412 | General smartphone | Client device | Access to client | Client | Client | Classification | Lock the device | Explicit Authentication | |
Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., & Song, Z. (2010). Authentication in the clouds: A framework and its application to mobile users. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, 1–6. https://doi.org/10.1145/1866835.1866837 | General smartphone apps | Cloud resource | Access to client and compromised credentials | Server | Server | Anomaly detection | Hashing of features | Reject a user request | |
Niinuma, K., Park, U., & Jain, A. K. (2010). Soft Biometric Traits for Continuous User Authentication. In IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (Vol. 5, Issue 4, pp. 771–780). IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. https://doi.org/10.1109/TIFS.2010.2075927 | General computer | Client device | Access to client and compromised credentials | Client | Client | Anomaly detection | Local processing | Lockt the device | Time decay, hard and soft biometrics |
-
Notifications
You must be signed in to change notification settings - Fork 0
das-group/CAuthN-Systems
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Online Appendix for: Continuous Authentication Beyond Error Rates: Reviewing General System Properties
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published