ACM Transactions on Information and System Security (TISSEC): Volume 18 Issue 4, May 2016
Citation Count: 0
Downloads (6 Weeks): 20, Downloads (12 Months): 192, Downloads (Overall): 573
Full text available:
Despite the tremendous amount of research fronting the use of touch gestures as a mechanism of continuous authentication on smart phones, very little research has been conducted to evaluate how these systems could behave if attacked by sophisticated adversaries. In this article, we present two Lego-driven robotic attacks on touch-based ...
robotic attacks, Touch gestures, behavioral biometrics, smartphone security
IT Professional: Volume 15 Issue 4, July 2013
Publisher: IEEE Educational Activities Department
For biometric modalities in which error rates are typically high--including behavioral biometrics, such as keystroke dynamics--temporal information associated with the occurrence of errors might help answer questions regarding performance evaluation.
Authentication,Biometrics (access control),Error analysis,Keystrokes,Performance evaluation,keystroke dynamics,continuous authentication,biometrics,performance evaluation