{"id":"https://openalex.org/W2468988960","doi":"https://doi.org/10.1145/2906388.2906404","title":"Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes","display_name":"Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes","publication_year":2016,"publication_date":"2016-06-20","ids":{"openalex":"https://openalex.org/W2468988960","doi":"https://doi.org/10.1145/2906388.2906404","mag":"2468988960"},"language":"en","primary_location":{"id":"doi:10.1145/2906388.2906404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2906388.2906404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103029246","display_name":"Hassan Khan","orcid":"https://orcid.org/0000-0003-2946-5920"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Hassan Khan","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102843571","display_name":"Urs Hengartner","orcid":"https://orcid.org/0000-0002-9840-0015"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Urs Hengartner","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059286689","display_name":"Daniel Vogel","orcid":"https://orcid.org/0000-0002-6360-4077"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Daniel Vogel","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103029246"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":11.2791,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.98261923,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13289","display_name":"Infant Health and Development","score":0.9542999863624573,"subfield":{"id":"https://openalex.org/subfields/3611","display_name":"Pharmacy"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimicry","display_name":"Mimicry","score":0.8335860371589661},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7617285847663879},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7135623693466187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6669245958328247},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6425018906593323},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5400830507278442}],"concepts":[{"id":"https://openalex.org/C7863114","wikidata":"https://www.wikidata.org/wiki/Q192627","display_name":"Mimicry","level":2,"score":0.8335860371589661},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7617285847663879},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7135623693466187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6669245958328247},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6425018906593323},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5400830507278442},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2906388.2906404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2906388.2906404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2385227","https://openalex.org/W1626992774","https://openalex.org/W1724737952","https://openalex.org/W1964160137","https://openalex.org/W1964814818","https://openalex.org/W1965555277","https://openalex.org/W1976081290","https://openalex.org/W1982527135","https://openalex.org/W1984665551","https://openalex.org/W1989000482","https://openalex.org/W2006605027","https://openalex.org/W2025221111","https://openalex.org/W2038790378","https://openalex.org/W2049957654","https://openalex.org/W2052279280","https://openalex.org/W2052525588","https://openalex.org/W2055389916","https://openalex.org/W2057249148","https://openalex.org/W2096295229","https://openalex.org/W2098617375","https://openalex.org/W2099468260","https://openalex.org/W2102932275","https://openalex.org/W2106351828","https://openalex.org/W2129793529","https://openalex.org/W2151854612","https://openalex.org/W2163582782","https://openalex.org/W2165689165","https://openalex.org/W2169908475","https://openalex.org/W2198321343","https://openalex.org/W2233999953","https://openalex.org/W2404603298","https://openalex.org/W2491181491","https://openalex.org/W2535614671","https://openalex.org/W6636759762","https://openalex.org/W6676288361","https://openalex.org/W6713486973"],"related_works":["https://openalex.org/W2566749067","https://openalex.org/W2159218316","https://openalex.org/W2332959588","https://openalex.org/W2379994817","https://openalex.org/W1980659691","https://openalex.org/W3104966193","https://openalex.org/W1983660090","https://openalex.org/W2123843216","https://openalex.org/W2242172122","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Touch":[0],"input":[1],"implicit":[2,186],"authentication":[3,187],"(``touch":[4],"IA'')":[5],"employs":[6],"behavioural":[7],"biometrics":[8],"like":[9],"touch":[10,32,52,97,128,196],"location":[11],"and":[12,16,34,42,55],"pressure":[13],"to":[14,102,123,157,163,180],"continuously":[15],"transparently":[17],"authenticate":[18],"smartphone":[19],"users.":[20],"We":[21],"provide":[22],"the":[23,74,80,89,103,146,151,173,182],"first":[24],"ever":[25],"evaluation":[26],"of":[27,71,76,106,138,145,175,184],"targeted":[28,177],"mimicry":[29,178],"attacks":[30,65,95,179],"on":[31,47,96,125,166,190],"IA":[33,53,98,152,197],"show":[35,61],"that":[36,62,92,195],"it":[37],"fails":[38],"against":[39],"shoulder":[40,63,93],"surfing":[41,64,94],"offline":[43,112],"training":[44,113,119],"attacks.":[45,169],"Based":[46,189],"experiments":[48],"with":[49,73,141],"three":[50],"diverse":[51],"schemes":[54],"256":[56],"unique":[57],"attacker-victim":[58],"pairs,":[59],"we":[60,115,193],"have":[66],"a":[67,201],"bypass":[68,135],"success":[69,136],"rate":[70],"84%":[72],"majority":[75],"successful":[77],"attackers":[78,122,133],"observing":[79],"victim's":[81],"behaviour":[82],"for":[83,121],"less":[84],"than":[85],"two":[86],"minutes.":[87],"Therefore,":[88],"accepted":[90],"assumption":[91],"are":[99],"infeasible":[100],"due":[101,162],"hidden":[104],"nature":[105],"some":[107],"features":[108,148],"is":[109,198],"incorrect.":[110],"For":[111],"attacks,":[114],"created":[116],"an":[117,185],"open-source":[118],"app":[120],"train":[124],"their":[126],"victims'":[127],"data.":[129],"With":[130],"this":[131],"training,":[132],"achieved":[134],"rates":[137],"86%,":[139],"even":[140],"only":[142],"partial":[143],"knowledge":[144],"underlying":[147],"used":[149],"by":[150],"scheme.":[153,188],"Previous":[154],"work":[155,171],"failed":[156],"find":[158],"these":[159],"severe":[160],"vulnerabilities":[161],"its":[164],"focus":[165],"random,":[167],"non-targeted":[168],"Our":[170],"demonstrates":[172],"importance":[174],"considering":[176],"evaluate":[181],"security":[183,202],"our":[191],"results,":[192],"conclude":[194],"unsuitable":[199],"from":[200],"standpoint.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
