Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
EarSlide: a Secure Ear Wearables Biometric Authentication Based on Acoustic Fingerprint
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 1Article No.: 24, Pages 1–29https://doi.org/10.1145/3643515Ear wearables (earables) are emerging platforms that are broadly adopted in various applications. There is an increasing demand for robust earables authentication because of the growing amount of sensitive information and the IoT devices that the earable ...
- research-articleSeptember 2023
VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 3Article No.: 91, Pages 1–26https://doi.org/10.1145/3610894Technical advances in the smart device market have fixated smartphones at the heart of our lives, warranting an ever more secure means of authentication. Although most smartphones have adopted biometrics-based authentication, after a couple of failed ...
- research-articleJune 2023
Fingerprinting IoT Devices Using Latent Physical Side-Channels
- Justin Feng,
- Tianyi Zhao,
- Shamik Sarkar,
- Dominic Konrad,
- Timothy Jacques,
- Danijela Cabric,
- Nader Sehatbakhsh
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 2Article No.: 54, Pages 1–26https://doi.org/10.1145/3596247The proliferation of low-end low-power internet-of-things (IoT) devices in "smart" environments necessitates secure identification and authentication of these devices via low-overhead fingerprinting methods. Previous work typically utilizes ...
- research-articleJune 2023
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation
- Jun Ho Huh,
- Sungsu Kwag,
- Iljoo Kim,
- Alexandr Popov,
- Younghan Park,
- Geumhwan Cho,
- Juwon Lee,
- Hyoungshick Kim,
- Choong-Hoon Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 2Article No.: 58, Pages 1–32https://doi.org/10.1145/3596236One of the main challenges in deploying a keystroke dynamics-based continuous authentication scheme on smartphones is ensuring low error rates over time. Unstable false rejection rates (FRRs) would lead to frequent phone locks during long-term use, and ...
- research-articleMarch 2023
NF-Heart: A Near-field Non-contact Continuous User Authentication System via Ballistocardiogram
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 1Article No.: 16, Pages 1–24https://doi.org/10.1145/3580851The increasingly remote workforce resulting from the global coronavirus pandemic has caused unprecedented cybersecurity concerns to organizations. Considerable evidence has shown that one-pass authentication fails to meet security needs when the ...
-
- research-articleJanuary 2023
WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 4Article No.: 167, Pages 1–34https://doi.org/10.1145/3569473PIN and pattern lock are difficult to accurately enter on small watch screens, and are vulnerable against guessing attacks. To address these problems, this paper proposes a novel implicit biometric scheme based on through-wrist acoustic responses. A cue ...
- research-articleSeptember 2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 3Article No.: 146, Pages 1–25https://doi.org/10.1145/3550322Implicit authentication for traditional objects, such as doors and dumbbells, has rich applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to smart environments; for instance, a contact sensor is attached to a ...
- research-articleJuly 2022
ToothSonic: Earable Authentication via Acoustic Toothprint
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 2Article No.: 78, Pages 1–24https://doi.org/10.1145/3534606Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse range of personal applications. The traditional authentication methods hence become less applicable and inconvenient for earables due to their limited input interface. ...
- research-articleJuly 2022
Reliable Digital Forensics in the Air: Exploring an RF-based Drone Identification System
- Zhengxiong Li,
- Baicheng Chen,
- Xingyu Chen,
- Chenhan Xu,
- Yuyang Chen,
- Feng Lin,
- Changzhi Li,
- Karthik Dantu,
- Kui Ren,
- Wenyao Xu
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 2Article No.: 63, Pages 1–25https://doi.org/10.1145/3534598As the drone becomes widespread in numerous crucial applications with many powerful functionalities (e.g., reconnaissance and mechanical trigger), there are increasing cases related to misused drones for unethical even criminal activities. Therefore, it ...
- research-articleJuly 2022
I Want to Know Your Hand: Authentication on Commodity Mobile Phones Based on Your Hand's Vibrations
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 2Article No.: 58, Pages 1–27https://doi.org/10.1145/3534575We present HoldPass, the first system that can authenticate a user while they simply hold their phone. It uses the heart activity as biometric trait sensed via the hand vibrations in response to the cardiac cycle - a process known as ballistocardiography ...
- research-articleMarch 2022
Integrating Handcrafted Features with Deep Representations for Smartphone Authentication
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 1Article No.: 27, Pages 1–27https://doi.org/10.1145/3517332Recent research demonstrates the potential of touch dynamics as a usable and privacy-preserving scheme for smartphone authentication. Most existing approaches rely on handcrafted features since deep models may be vulnerable to behavioral uncertainty due ...
- research-articleMarch 2022
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication
- Kyuin Lee,
- Yucheng Yang,
- Omkar Prabhune,
- Aishwarya Lekshmi Chithra,
- Jack West,
- Kassem Fawaz,
- Neil Klingensmith,
- Suman Banerjee,
- Younghyun Kim
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 1Article No.: 20, Pages 1–29https://doi.org/10.1145/3517254Wireless connectivity is becoming common in increasingly diverse personal devices, enabling various interoperation- and Internet-based applications and services. More and more interconnected devices are simultaneously operated by a single user with short-...
- research-articleMarch 2022
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 6, Issue 1Article No.: 16, Pages 1–26https://doi.org/10.1145/3517232Voice assistants are deployed widely and provide useful functionality. However, recent work has shown that commercial systems like Amazon Alexa and Google Home are vulnerable to voice-based confusion attacks that exploit design issues. We propose a ...
- research-articleDecember 2021
Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 4Article No.: 152, Pages 1–23https://doi.org/10.1145/3494984The convenience of laptops brings with it the risk of information leakage, and conventional security systems based on the password or the explicit biometric do little to alleviate this problem. Biometric identification based on anatomical features ...
- research-articleDecember 2021
Unobtrusive Pedestrian Identification by Leveraging Footstep Sounds with Replay Resistance
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 4Article No.: 160, Pages 1–19https://doi.org/10.1145/3494963The ability to identify pedestrians unobtrusively is essential for smart buildings to provide customized environments, energy saving, health monitoring and security-enhanced services. In this paper, we present an unobtrusive pedestrian identification ...
- research-articleDecember 2021
ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 4Article No.: 148, Pages 1–25https://doi.org/10.1145/3494962Voice-based authentication is prevalent on smart devices to verify the legitimacy of users, but is vulnerable to replay attacks. In this paper, we propose to leverage the distinctive chest motions during speaking to establish a secure multi-factor ...
- research-articleJune 2021
IriTrack: Face Presentation Attack Detection Using Iris Tracking
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 2Article No.: 78, Pages 1–21https://doi.org/10.1145/3463515With a growing adoption of face authentication systems in various application scenarios, face Presentation Attack Detection (PAD) has become of great importance to withstand artefacts. Existing methods of face PAD generally focus on designing intelligent ...
- research-articleMarch 2021
Voice In Ear: Spoofing-Resistant and Passphrase-Independent Body Sound Authentication
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 1Article No.: 12, Pages 1–25https://doi.org/10.1145/3448113With the rapid growth of wearable computing and increasing demand for mobile authentication scenarios, voiceprint-based authentication has become one of the prevalent technologies and has already presented tremendous potentials to the public. However, it ...
- research-articleMarch 2021
EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 1Article No.: 39, Pages 1–27https://doi.org/10.1145/3448098Biometric-based authentication is gaining increasing attention for wearables and mobile applications. Meanwhile, the growing adoption of sensors in wearables also provides opportunities to capture novel wearable biometrics. In this work, we propose ...
- research-articleMarch 2021
Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 5, Issue 1Article No.: 33, Pages 1–30https://doi.org/10.1145/3448080Pattern lock has been widely used in smartphones as a simple and effective authentication mechanism, which however is shown to be vulnerable to various attacks. In this paper, we design a novel authentication system for more secure pattern unlocking on ...