Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verification for new generation devices.pdf

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité

Consultez-les par la suite

1 sur 20 Publicité

SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verification for new generation devices.pdf

Télécharger pour lire hors ligne

The proliferation of smart devices, such as smartphones/smartwatches, and tablets, is accompanied by an increased trust that users put on mobile applications for performing online transactions, social networking, storing credentials, and organizing photos and videos. As a matter of fact, any unauthorized access to such device, whether intentional or accidental, could lead to a loss of sensible data and a misuse of the user’s identity. Most popular user authentication schemes are based on “something user knows”, e.g., PIN/password, and “something user has”, e.g., physical characteristics, are no more considered secure enough to protect data. To this end, behavioral biometrics have attracted significant attention from academia and industry in recent years. This talk aims at explaining how these behaviors could be used to develop novel, user-friendly, and secure authentication mechanims.

The proliferation of smart devices, such as smartphones/smartwatches, and tablets, is accompanied by an increased trust that users put on mobile applications for performing online transactions, social networking, storing credentials, and organizing photos and videos. As a matter of fact, any unauthorized access to such device, whether intentional or accidental, could lead to a loss of sensible data and a misuse of the user’s identity. Most popular user authentication schemes are based on “something user knows”, e.g., PIN/password, and “something user has”, e.g., physical characteristics, are no more considered secure enough to protect data. To this end, behavioral biometrics have attracted significant attention from academia and industry in recent years. This talk aims at explaining how these behaviors could be used to develop novel, user-friendly, and secure authentication mechanims.

Publicité
Publicité

Plus De Contenu Connexe

Plus par South Tyrol Free Software Conference (20)

Plus récents (20)

Publicité

SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verification for new generation devices.pdf

  1. 1. Behavioral Biometrics-based identity verification for new generation devices Attaullah Buriro SFSCON 2022, Bolzano, Italy 12th November, 2022
  2. 2. A Question of Identity? How we authenticate people? 12/11/2022 Behavioral Biometrics-based identity verification 2 Photo Source: Spencer Alexander
  3. 3. A Question of Identity? How smart- devices authenticate their owners? Asking for a secret 12/11/2022 3 Face Recognition Fingerprint Recognition Behavioral Biometrics-based identity verification
  4. 4. Why is the Authentication important? 4 Social Networking Online Transactions 12/11/2022 Behavioral Biometrics-based identity verification
  5. 5. Existing Authentication Methods 12/11/2022 5 Behavioral Biometrics-based identity verification
  6. 6. Are they secure? 12/11/2022 6 Sr. # PIN Frequency (%) 1 1234 10.713 % 2 1111 6.016 % 3 0000 1.881 % 4 1212 1.197 % Behavioral Biometrics-based identity verification
  7. 7. Authentication Methods: Problems Source: Android SmartLock 12/11/2022 7 Behavioral Biometrics-based identity verification
  8. 8. Authentication Methods: Problems Apple’s iPhone 5S Fingerprint Sensor hacked just after two days of its release by Germany's Chaos Computer Club 12/11/2022 8 Behavioral Biometrics-based identity verification
  9. 9. Consequences Source: Americanbanker 12/11/2022 9 https://www.idtheftcenter.org/ Behavioral Biometrics-based identity verification
  10. 10. Are they usable? 12/11/2022 10 Alexander De Luca et al, I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones, CHI 2015. Behavioral Biometrics-based identity verification
  11. 11. Is there any alternate • Yes, Behavioral Biometrics • There are wide range of actions “behaviors” people perform by employing “different strategies”, “different styles”, and by applying their “unique skills”. – Unobtrusive data collection – No need of additional hardware – Arguably very secure 12/11/2022 11 Behavioral Biometrics-based identity verification
  12. 12. Behavioral Biometrics 12/11/2022 12 Behavioral Biometrics-based identity verification
  13. 13. Available Sensors 12/11/2022 13 Behavioral Biometrics-based identity verification
  14. 14. Our Solution – Hold & Sign How a user holds & writes her own Name on the Screen 12/11/2022 14 Attaullah Buriro, et al. "Hold and sign: A novel behavioral biometrics for smartphone user authentication. "2016 IEEE security and privacy workshops (SPW). IEEE, 2016. Behavioral Biometrics-based identity verification
  15. 15. Our Solution – Hold & Dial How a user holds her phone & dials her own number 12/11/2022 15 Attaullah Buriro, et al. "Dialerauth: A motion- assisted touch-based smartphone user authentication scheme." Proceedings of the eighth ACM conference on data and application security and privacy. 2018. Behavioral Biometrics-based identity verification
  16. 16. Our Solution – AnswerAuth 12/11/2022 16 Attaullah Buriro, et al. "AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones."Journal of information security and applications 44 (2019): 89-103. Behavioral Biometrics-based identity verification
  17. 17. Our Solution - SnapAuth 12/11/2022 17 Attaullah Buriro, et al. "SnapAuth: a gesture-based unobtrusive smartwatch user authentication scheme." International Workshop on Emerging Technologies for Authorization and Authentication. Springer, Cham, 2018. Behavioral Biometrics-based identity verification
  18. 18. Our Solution - ClapAuth 12/11/2022 18 Attaullah Buriro, et al. “ClapAuth: A Gesture-based User-friendly Authentication Scheme to Access a Secure Infrastructure”. International Workshop on Emerging Technologies for Authorization and Authentication. Springer, Cham, 2022. Behavioral Biometrics-based identity verification
  19. 19. Aknowledgment 12/11/2022 Behavioral Biometrics 19
  20. 20. Thanks for your attention 12/11/2022 20 Behavioral Biometrics

×