Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SP.2014.51guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

ZEBRA: Zero-Effort Bilateral Recurring Authentication

Published: 18 May 2014 Publication History

Abstract

Common authentication methods based on passwords, tokens, or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. Users often do not log out, however, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals. One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are not sufficient: they only confirm whether the user is nearby but not whether the user is actually using the terminal. Proposed solutions based on behavioral biometric authentication (e.g., keystroke dynamics) may not be reliable, as a recent study suggests. To address this problem we propose Zero-Effort Bilateral Recurring Authentication (ZEBRA). In ZEBRA, a user wears a bracelet (with a built-in accelerometer, gyroscope, and radio) on her dominant wrist. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it, and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user (via keyboard and mouse), and confirms the continued presence of the user only if they correlate. Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same - the user's hand movement. In our experiments ZEBRA performed continuous authentication with 85% accuracy in verifying the correct user and identified all adversaries within 11s. For a different threshold that trades security for usability, ZEBRA correctly verified 90% of users and identified all adversaries within 50s.

Cited By

View all
  • (2024)Sound-based Two-factor Authentication: Vulnerabilities and RedesignACM Transactions on Privacy and Security10.1145/363217527:1(1-27)Online publication date: 10-Jan-2024
  • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
  • (2023)Continuous Authentication Using Human-Induced Electric PotentialProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627124(409-423)Online publication date: 4-Dec-2023
  • Show More Cited By
  1. ZEBRA: Zero-Effort Bilateral Recurring Authentication

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '14: Proceedings of the 2014 IEEE Symposium on Security and Privacy
    May 2014
    694 pages
    ISBN:9781479946860

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 18 May 2014

    Author Tag

    1. continuous authentication, deauthentication, security, usability, wearable

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sound-based Two-factor Authentication: Vulnerabilities and RedesignACM Transactions on Privacy and Security10.1145/363217527:1(1-27)Online publication date: 10-Jan-2024
    • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
    • (2023)Continuous Authentication Using Human-Induced Electric PotentialProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627124(409-423)Online publication date: 4-Dec-2023
    • (2022)G2AuthProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538941(84-98)Online publication date: 27-Jun-2022
    • (2022)Authentication for drone delivery through a novel way of using face biometricsProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3560550(609-622)Online publication date: 14-Oct-2022
    • (2022)BioTagProceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3492866.3549718(191-200)Online publication date: 3-Oct-2022
    • (2022)Next2You: Robust Copresence Detection Based on Channel State InformationACM Transactions on Internet of Things10.1145/34912443:2(1-31)Online publication date: 15-Feb-2022
    • (2021)Vision: Computing and Authentication Practicesin Global Oil and Gas FieldsProceedings of the 2021 European Symposium on Usable Security10.1145/3481357.3481524(118-123)Online publication date: 11-Oct-2021
    • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
    • (2020)BoxerProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489301(1571-1588)Online publication date: 12-Aug-2020
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media