{"id":"https://openalex.org/W2035866181","doi":"https://doi.org/10.1145/2660267.2662373","title":"POSTER","display_name":"POSTER","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2035866181","doi":"https://doi.org/10.1145/2660267.2662373","mag":"2035866181"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2662373","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024290149","display_name":"Aaron Atwater","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Aaron Atwater","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103029246","display_name":"Hassan Khan","orcid":"https://orcid.org/0000-0003-2946-5920"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hassan Khan","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102843571","display_name":"Urs Hengartner","orcid":"https://orcid.org/0000-0002-9840-0015"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Urs Hengartner","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024290149"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":1.5778,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87789275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1415","last_page":"1417"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8287234306335449},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6551964282989502},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.6149715781211853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5648348927497864},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5173989534378052},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5169278979301453},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5159350037574768},{"id":"https://openalex.org/keywords/backward-compatibility","display_name":"Backward compatibility","score":0.47874706983566284},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42875024676322937},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4225979447364807},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2424456775188446},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2063303291797638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8287234306335449},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6551964282989502},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.6149715781211853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5648348927497864},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5173989534378052},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5169278979301453},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5159350037574768},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.47874706983566284},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42875024676322937},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4225979447364807},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2424456775188446},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2063303291797638}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2660267.2662373","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1572369853","https://openalex.org/W1724737952","https://openalex.org/W1976081290","https://openalex.org/W1982527135","https://openalex.org/W1984665551","https://openalex.org/W2038790378","https://openalex.org/W2055356737","https://openalex.org/W2098617375","https://openalex.org/W2129793529","https://openalex.org/W2145985203","https://openalex.org/W2151854612","https://openalex.org/W2154123601","https://openalex.org/W2164675859","https://openalex.org/W2404603298","https://openalex.org/W2525579820","https://openalex.org/W2535614671","https://openalex.org/W6713486973"],"related_works":["https://openalex.org/W2982321410","https://openalex.org/W2392004567","https://openalex.org/W2046296964","https://openalex.org/W143386018","https://openalex.org/W2940029036","https://openalex.org/W4388292429","https://openalex.org/W2756595502","https://openalex.org/W1004582678","https://openalex.org/W2010789764","https://openalex.org/W2146270836"],"abstract_inverted_index":{"Possession":[0],"of":[1,20,33,77,135],"modern":[2],"smartphones":[3],"is":[4],"becoming":[5],"increasingly":[6],"ubiquitous,":[7],"and":[8,61,86,94,110,177,250,253],"with":[9],"this":[10,163],"rise":[11,16],"in":[12,17,46,108,141,196],"usage":[13],"comes":[14],"a":[15,89,129,147],"the":[18,29,34,47,75,81,92,102,106,113,116,142,151,204,218,228,245,255,263],"amount":[19],"sensitive":[21,98,120,241],"data":[22,99,182,242],"being":[23,266],"stored":[24],"on":[25,80,100,133,217,247],"them.":[26],"Despite":[27],"this,":[28],"high-frequency,":[30],"low-duration":[31],"nature":[32],"average":[35],"smartphone":[36],"session":[37],"makes":[38],"passwords":[39],"or":[40,154],"PIN-locks":[41],"even":[42],"less":[43],"usable":[44],"than":[45],"desktop":[48],"context.":[49],"To":[50],"combat":[51],"these":[52],"issues,":[53],"implicit":[54],"authentication":[55],"(IA)":[56],"schemes":[57,66,123,171],"can":[58,124],"be":[59,126],"developed":[60],"deployed":[62,127],"to":[63,96,183,214,238],"smartphones.":[64],"IA":[65,103,122,170,226,264],"continuously":[67],"authenticate":[68],"users":[69],"by":[70],"profiling":[71],"their":[72],"behaviour":[73,109],"using":[74,172],"variety":[76],"sensors":[78],"prevalent":[79],"phones,":[82],"such":[83],"as":[84,128],"touchscreens":[85],"accelerometers.":[87],"When":[88],"non-owner":[90],"acquires":[91],"device":[93,251],"attempts":[95],"access":[97],"it,":[101],"scheme":[104,265],"recognizes":[105],"difference":[107],"automatically":[111],"ejects":[112],"attacker":[114],"from":[115],"system.":[117],"In":[118,162],"particularly":[119],"contexts,":[121],"also":[125],"secondary":[130],"defence":[131],"mechanism":[132],"top":[134],"explicit":[136],"authentication,":[137],"providing":[138],"layered":[139],"security":[140],"event":[143],"of,":[144],"for":[145,169,203,221,262],"example,":[146],"shoulder-surfing":[148],"attack":[149],"compromising":[150],"device's":[152],"PIN":[153],"an":[155,197],"operating":[156,206],"system":[157,207],"vulnerability":[158],"allowing":[159],"its":[160],"bypass.":[161],"work,":[164],"we":[165,232],"evaluate":[166,178],"existing":[167,219],"proposals":[168],"different":[173],"behavioural":[174],"feature":[175],"sets,":[176],"them":[179,195],"against":[180],"real-world":[181],"show":[184],"when":[185],"they":[186],"are":[187,189],"(and":[188],"not)":[190],"useful.":[191],"We":[192],"have":[193,233],"implemented":[194],"easily":[198],"extensible":[199],"open":[200],"source":[201],"framework":[202],"Android":[205],"called":[208],"Itus,":[209],"which":[210,231],"allows":[211,235],"other":[212],"researchers":[213],"iteratively":[215],"improve":[216],"mechanisms":[220],"performing":[222],"IA.":[223],"Itus":[224],"performs":[225],"at":[227,254],"app":[229,236],"level,":[230],"shown":[234],"developers":[237],"selectively":[239],"protect":[240],"while":[243],"decreasing":[244],"impact":[246],"battery":[248],"life":[249],"performance,":[252],"same":[256],"time":[257],"obtaining":[258],"better":[259],"detection":[260],"accuracy":[261],"invoked.":[267]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
