Continuous authentication of smartphones based on application usage

Upal Mahbub, Jukka Komulainen, Denzil Ferreira, Rama Chellappa

Research output: Contribution to journalArticlepeer-review

Abstract

An empirical investigation of active/continuous authentication for smartphones is presented by exploiting users' unique application usage data, i.e., distinct patterns of use, modeled by a Markovian process. Specifically, variations of hidden Markov models (HMMs) are evaluated for continuous user verification, and challenges due to the sparsity of session-wise data, an explosion of states, and handling unforeseen events in the test data are tackled. Unlike traditional approaches, the proposed formulation utilizes the complete app-usage information to achieve low latency. Through experimentation, empirical assessment of the impact of unforeseen events, i.e., unknown applications and unforeseen observations, on user verification is done via a modified edit-distance algorithm for sequence matching. It is found that for enhanced verification performance, unforeseen events should be considered. For validation, extensive experiments on two distinct datasets, namely, UMDAA-02 and Securacy, are performed. Using the marginally smoothed HMM a low equal error rate (EER) of 16.16% is reached for the Securacy dataset and the same method is found to be able to detect an intrusion within 2.5 min of application use.

Original languageEnglish (US)
Article number8721521
Pages (from-to)165-180
Number of pages16
JournalIEEE Transactions on Biometrics, Behavior, and Identity Science
Volume1
Issue number3
DOIs
StatePublished - Jul 2019
Externally publishedYes

Keywords

  • Active authentication
  • Markov chains
  • application usage-based verification
  • hidden Markov models
  • marginal smoothing
  • sequence matching
  • unforeseen observation handling

ASJC Scopus subject areas

  • Computer Science Applications
  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Instrumentation

Fingerprint

Dive into the research topics of 'Continuous authentication of smartphones based on application usage'. Together they form a unique fingerprint.

Cite this