280 likes | 497 Views
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it. Arjmand Samuel Microsoft Research. Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
E N D
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University
PIN/Password based Authentication Shoulder surfing Smudge attack
Gesture based Authentication (GEAT) J. A. Ouellete and W. Wood. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin, 124(1):54-74, July 1998. Not What they input but How they input Resilient to • Should surfing attack • Smudge attack Requires no extra hardware Scientific foundation: human behavior tends to be consistent in same context.
Data Collection Recruited 50 volunteers • Ages between 19 and 55 • students, faculty, corporate employees Gave phones with data collection app to volunteers Data collection app • Asked users to perform gestures shown on screen • Stored the samples in a cloud based storage
2 3 4 1 5 6 7 8
Gesture Features Stroke time Displacement Magnitude Displacement Direction Inter-Stroke time • Stroke time • Inter-stroke time • Displacement magnitude • Displacement direction • Velocity magnitude • Velocity direction • Device Acceleration
Stroke, Inter-stroke times Stroke times Inter-stroke times
Velocity Magnitude Volunteer 1 Volunteer 2
Device Acceleration Volunteer 1 Volunteer 2
How GEAT works Collect training samples Generate classification model Securely unlock the phone
Classification Model Noise removal Features for classification Classifier training and Gesture ranking
Noise Removal Simple Moving Average (Low Pass Filter)
Features for Classification Stroke based features Sub-stroke based features Features used • Stroke time • Inter-stroke time • Displacement magnitude • Displacement direction • Velocity magnitude • Velocity direction • Device Acceleration
Feature Selection Discarded Selected
Classifier training Single class classification Support Vector Distribution Estimation (SVDE) • RBF kernel • Grid search for optimal classifier parameters Gesture Ranking
Securely unlocking the device Rejected Accepted Majority Voting Decision:Accepted Accepted
Handling Multiple Behaviors Segregate the samples from different behaviors Generate Minimum Variance Partitions • Agglomerative Hierarchical Clustering • Wards Linkage Train classifiers for each cluster Test an unknown sample against each cluster
Accuracy Evaluation Single gesture Three gestures Avg EER • 4.8% with DA • 6.8% without DA Avg EER • 1.7% with DA • 3.7% without DA
Conclusion Proposed a gesture based authentication scheme • Improves security and usability • Resilient to shoulder surfing attacks and smudge attacks • Handles multiple user behaviors • Evaluation through simulations and real world experiments More in the paper • Detailed data analysis • Technical details of • extracting multiple behaviors • determining duration and locations of sub-strokes • classifier training • more evaluation