{"id":"https://openalex.org/W2881632231","doi":"https://doi.org/10.1145/3210240.3210317","title":"Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication","display_name":"Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication","publication_year":2018,"publication_date":"2018-06-10","ids":{"openalex":"https://openalex.org/W2881632231","doi":"https://doi.org/10.1145/3210240.3210317","mag":"2881632231"},"language":"en","primary_location":{"id":"doi:10.1145/3210240.3210317","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3210240.3210317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103029246","display_name":"Hassan Khan","orcid":"https://orcid.org/0000-0003-2946-5920"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Hassan Khan","raw_affiliation_strings":["Cheriton School of Computer Science, University of Waterloo"],"affiliations":[{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102843571","display_name":"Urs Hengartner","orcid":"https://orcid.org/0000-0002-9840-0015"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Urs Hengartner","raw_affiliation_strings":["Cheriton School of Computer Science, University of Waterloo"],"affiliations":[{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055522213","display_name":"Daniel Vogel","orcid":"https://orcid.org/0000-0001-7620-0541"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Daniel Vogel","raw_affiliation_strings":["Cheriton School of Computer Science, University of Waterloo"],"affiliations":[{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103029246"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":5.105,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.95871713,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8224236369132996},{"id":"https://openalex.org/keywords/mimicry","display_name":"Mimicry","score":0.7804373502731323},{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.7284361720085144},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5922369360923767},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5486229658126831},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.543999969959259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5373289585113525},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5216506123542786},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.49835848808288574},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.47940680384635925},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45255130529403687},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.19606533646583557},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11268395185470581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8224236369132996},{"id":"https://openalex.org/C7863114","wikidata":"https://www.wikidata.org/wiki/Q192627","display_name":"Mimicry","level":2,"score":0.7804373502731323},{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.7284361720085144},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5922369360923767},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5486229658126831},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.543999969959259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5373289585113525},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5216506123542786},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.49835848808288574},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.47940680384635925},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45255130529403687},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.19606533646583557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11268395185470581},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3210240.3210317","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3210240.3210317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W2385227","https://openalex.org/W87400274","https://openalex.org/W1964160137","https://openalex.org/W1964814818","https://openalex.org/W1976081290","https://openalex.org/W1979834178","https://openalex.org/W1980235022","https://openalex.org/W1981934656","https://openalex.org/W1982527135","https://openalex.org/W1989000482","https://openalex.org/W1994281102","https://openalex.org/W1994367916","https://openalex.org/W2001427579","https://openalex.org/W2008423668","https://openalex.org/W2011593588","https://openalex.org/W2017658349","https://openalex.org/W2027222744","https://openalex.org/W2041995828","https://openalex.org/W2052279280","https://openalex.org/W2052525588","https://openalex.org/W2053551963","https://openalex.org/W2055389916","https://openalex.org/W2057249148","https://openalex.org/W2064376060","https://openalex.org/W2076463985","https://openalex.org/W2084748102","https://openalex.org/W2090465075","https://openalex.org/W2098617375","https://openalex.org/W2099468260","https://openalex.org/W2102311709","https://openalex.org/W2102932275","https://openalex.org/W2113137917","https://openalex.org/W2122122381","https://openalex.org/W2133059825","https://openalex.org/W2133470485","https://openalex.org/W2136928336","https://openalex.org/W2142747340","https://openalex.org/W2151854612","https://openalex.org/W2153635508","https://openalex.org/W2154123601","https://openalex.org/W2164675859","https://openalex.org/W2165689165","https://openalex.org/W2233999953","https://openalex.org/W2295854647","https://openalex.org/W2404603298","https://openalex.org/W2468988960","https://openalex.org/W2479737891","https://openalex.org/W2494724603","https://openalex.org/W2571931900","https://openalex.org/W2611149039","https://openalex.org/W2613395272","https://openalex.org/W2662647872","https://openalex.org/W2790382682","https://openalex.org/W2944523811","https://openalex.org/W4206434639","https://openalex.org/W4301384209"],"related_works":["https://openalex.org/W3185561589","https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W2159333170","https://openalex.org/W4211208539","https://openalex.org/W3169822312","https://openalex.org/W2155670618","https://openalex.org/W2031617473","https://openalex.org/W1966864883","https://openalex.org/W1563893514"],"abstract_inverted_index":{"We":[0,98],"develop":[1],"an":[2,127],"augmented":[3],"reality-based":[4],"app":[5,47],"that":[6,111],"resides":[7],"on":[8,26,39,66,88,91],"the":[9,27,40,57,124,147],"attacker's":[10],"smartphone":[11],"and":[12,16,95,104],"leverages":[13],"computer":[14],"vision":[15],"raw":[17],"input":[18,143],"data":[19],"to":[20,63,73,76,109,116,140,164],"provide":[21],"real-time":[22],"mimicry":[23,129,167],"attack":[24,141,149],"guidance":[25,163],"victim's":[28,41],"phone.":[29],"Our":[30,134],"approach":[31,171],"does":[32],"not":[33],"require":[34],"tampering":[35],"or":[36,43],"installing":[37],"software":[38],"device,":[42],"specialized":[44],"hardware.":[45],"The":[46],"is":[48,152,156],"demonstrated":[49],"by":[50],"attacking":[51],"keystroke":[52,119],"dynamics,":[53],"a":[54,67,82,92,157],"method":[55,86,136],"leveraging":[56],"unique":[58],"typing":[59],"behaviour":[60],"of":[61,123,131,160,168,172],"users":[62],"authenticate":[64],"them":[65],"smartphone,":[68],"which":[69],"was":[70],"previously":[71],"thought":[72],"be":[74,138],"hard":[75],"mimic.":[77],"In":[78],"addition,":[79],"we":[80,150],"propose":[81],"low-tech":[83],"AR-like":[84],"audiovisual":[85],"based":[87],"spatial":[89],"pointers":[90],"transparent":[93],"film":[94],"audio":[96],"cues.":[97],"conduct":[99],"experiments":[100],"with":[101],"31":[102],"participants":[103],"mount":[105],"over":[106],"400":[107],"attacks":[108,125],"show":[110],"our":[112],"methods":[113],"enable":[114,165],"attackers":[115],"successfully":[117],"bypass":[118],"dynamics":[120],"for":[121],"87%":[122],"after":[126],"average":[128],"training":[130],"four":[132],"minutes.":[133],"AR-based":[135],"can":[137],"extended":[139],"other":[142],"behaviour-based":[144],"biometrics.":[145],"While":[146],"particular":[148],"describe":[151],"relatively":[153],"narrow,":[154],"it":[155],"good":[158],"example":[159],"using":[161],"AR":[162,176],"successful":[166],"user":[169],"behaviour---an":[170],"increasing":[173],"concern":[174],"as":[175],"functionality":[177],"becomes":[178],"more":[179],"commonplace.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
