TY - GEN
T1 - TouchIn
T2 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
AU - Sun, Jingchao
AU - Zhang, Rui
AU - Zhang, Jinxue
AU - Zhang, Yanchao
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/23
Y1 - 2014/12/23
N2 - Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing mobile authentication techniques are often cumbersome to use and also vulnerable to shoulder-surfing and smudge attacks. This paper focuses on designing, implementing, and evaluating TouchIn, a two-factor authentication system on multi-touch mobile devices. TouchIn works by letting a user draw on the touchscreen with one or multiple fingers to unlock his mobile device, and the user is authenticated based on the geometric properties of his drawn curves as well as his behavioral and physiological characteristics. TouchIn allows the user to draw on arbitrary regions on the touchscreen without looking at it. This nice sightless feature makes TouchIn very easy to use and also robust to shoulder-surfing and smudge attacks. Comprehensive experiments on Android devices confirm the high security and usability of TouchIn.
AB - Mobile authentication is indispensable for preventing unauthorized access to multi-touch mobile devices. Existing mobile authentication techniques are often cumbersome to use and also vulnerable to shoulder-surfing and smudge attacks. This paper focuses on designing, implementing, and evaluating TouchIn, a two-factor authentication system on multi-touch mobile devices. TouchIn works by letting a user draw on the touchscreen with one or multiple fingers to unlock his mobile device, and the user is authenticated based on the geometric properties of his drawn curves as well as his behavioral and physiological characteristics. TouchIn allows the user to draw on arbitrary regions on the touchscreen without looking at it. This nice sightless feature makes TouchIn very easy to use and also robust to shoulder-surfing and smudge attacks. Comprehensive experiments on Android devices confirm the high security and usability of TouchIn.
UR - http://www.scopus.com/inward/record.url?scp=84921466556&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921466556&partnerID=8YFLogxK
U2 - 10.1109/CNS.2014.6997513
DO - 10.1109/CNS.2014.6997513
M3 - Conference contribution
AN - SCOPUS:84921466556
T3 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
SP - 436
EP - 444
BT - 2014 IEEE Conference on Communications and Network Security, CNS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 29 October 2014 through 31 October 2014
ER -