Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.

Slides:



Advertisements
Similar presentations
GMD German National Research Center for Information Technology Darmstadt University of Technology Perspectives and Priorities for Digital Libraries Research.
Advertisements

1 Evaluation Rong Jin. 2 Evaluation  Evaluation is key to building effective and efficient search engines usually carried out in controlled experiments.
Henry C. H. Chen and Patrick P. C. Lee
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Optimal Design Laboratory | University of Michigan, Ann Arbor 2011 Design Preference Elicitation Using Efficient Global Optimization Yi Ren Panos Y. Papalambros.
Mining Sequence Patterns from Wind Tunnel Experimental Data Zhenyu Liu †, Wesley W. Chu †, Adam Huang ‡, Chris Folk ‡, Chih-Ming Ho ‡
Machine Learning as Applied to Intrusion Detection By Christine Fossaceca.
Applications of Data Mining in Microarray Data Analysis Yen-Jen Oyang Dept. of Computer Science and Information Engineering.
Distributed and Efficient Classifiers for Wireless Audio-Sensor Networks Baljeet Malhotra Ioanis Nikolaidis Mario A. Nascimento University of Alberta Canada.
Learning Transportation Mode from Raw GPS Data for Geographic Applications on the Web Yu Zheng, Like Liu, Xing Xie Microsoft Research.
© 2013 IBM Corporation Efficient Multi-stage Image Classification for Mobile Sensing in Urban Environments Presented by Shashank Mujumdar IBM Research,
Introduction to machine learning
KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.
Muhammad Shahzad 1, Saira Zahid 1, Syed Ali Khayam 1,2, Muddassar Farooq 1 1 Next Generation Intelligent Networks Research Center National University of.
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
Cloud Computing Introduction to China-cloud Project and Related Works in JSI Yi Liu Sino-German Joint Software Institute, Beihang Univ. May 2011.
AdvisorStudent Dr. Jia Li Shaojun Liu Dept. of Computer Science and Engineering, Oakland University 3D Shape Classification Using Conformal Mapping In.
A VOICE ACTIVITY DETECTOR USING THE CHI-SQUARE TEST
Inferno : Side-channel Attacks for Mobile Web Browsers Manuel Philipose, Matthew Halpern, Pavel Lifshits, Mark Silberstein, Mohit Tiwari Background and.
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
by B. Zadrozny and C. Elkan
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
Prediction model building and feature selection with SVM in breast cancer diagnosis Cheng-Lung Huang, Hung-Chang Liao, Mu- Chen Chen Expert Systems with.
Presented by Tienwei Tsai July, 2005
©2008 Srikanth Kallurkar, Quantum Leap Innovations, Inc. All rights reserved. Apollo – Automated Content Management System Srikanth Kallurkar Quantum Leap.
© Copyright 2004 ECE, UM-Rolla. All rights reserved A Brief Overview of Neural Networks By Rohit Dua, Samuel A. Mulder, Steve E. Watkins, and Donald C.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
Fan Guo 1, Chao Liu 2 and Yi-Min Wang 2 1 Carnegie Mellon University 2 Microsoft Research Feb 11, 2009.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
Permission-based Malware Detection in Android Devices REU fellow: Nadeen Saleh 1, Faculty mentor: Dr. Wenjia Li 2 Affiliation: 1. Florida Atlantic University,
LOGO Ensemble Learning Lecturer: Dr. Bo Yuan
Noise Can Help: Accurate and Efficient Per-flow Latency Measurement without Packet Probing and Time Stamping Dept. of Computer Science and Engineering.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Keystroke Recognition using WiFi Signals
A Regression Approach to Music Emotion Recognition Yi-Hsuan Yang, Yu-Ching Lin, Ya-Fan Su, and Homer H. Chen, Fellow, IEEE IEEE TRANSACTIONS ON AUDIO,
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Human Activity Recognition Using Accelerometer on Smartphones
A hybrid SOFM-SVR with a filter-based feature selection for stock market forecasting Huang, C. L. & Tsai, C. Y. Expert Systems with Applications 2008.
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Srinivas Cheekati( ) Instructor: Dr. Dong-Chul Kim
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
Classification of real and pseudo microRNA precursors using local structure-sequence features and support vector machine 朱林娇 14S
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
A Framework to Predict the Quality of Answers with Non-Textual Features Jiwoon Jeon, W. Bruce Croft(University of Massachusetts-Amherst) Joon Ho Lee (Soongsil.
Neural Network Recognition of Frequency Disturbance Recorder Signals Stephen Tang REU Final Presentation July 22, 2014.
DeepDroid Dynamically Enforcing Enterprise Policy Manwoong (Andy) Choi
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
The eCSG Mobile App Mario Torrisi INFN – Division of Catania 24 June 2013 Webinar on the eCSG 1.
Machine Learning Usman Roshan Dept. of Computer Science NJIT.
A Stochastic Frame Based Approach to RFID Tag Searching Ann L. Wang Dept. of Computer Science and Engineering Michigan State University Joint work with.
Machine Learning with Spark MLlib
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Efficient Multi-User Indexing for Secure Keyword Search
Accelerate GDPR compliance with Microsoft 365
Edinburgh Napier University
R SE to the challenges of ntelligent systems
Recognizing Smoking Gestures with Inertial Measurements Unit (IMU)
The Plant Database.
Deep Learning Hierarchical Representations for Image Steganalysis
Face Components detection
GAUSSIAN PROCESS REGRESSION WITHIN AN ACTIVE LEARNING SCHEME
Keystroke Recognition using Wi-Fi Signals
A maximum likelihood estimation and training on the fly approach
Mole: Motion Leaks through Smartwatch Sensors
Presentation transcript:

Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University

Security Sensitive Information in Mobile Device Muhammad Shahzad

PIN/Password based Authentication Shoulder surfing Smudge attack Muhammad Shahzad

Gesture based Authentication (GEAT) Not What they input but How they input Resilient to Should surfing attack Smudge attack Requires no extra hardware Scientific foundation: human behavior tends to be consistent in same context. J. A. Ouellete and W. Wood. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin, 124(1):54-74, July 1998. Muhammad Shahzad

Gestures for Authentication Muhammad Shahzad

Data Collection and Analysis

Data Collection Recruited 50 volunteers Ages between 19 and 55 students, faculty, corporate employees Gave phones with data collection app to volunteers Data collection app Asked users to perform gestures shown on screen Stored the samples in a cloud based storage Muhammad Shahzad

2 3 4 1 5 6 7 8

Gesture Features Stroke time Inter-stroke time Displacement magnitude Displacement direction Velocity magnitude Velocity direction Device Acceleration Stroke time Displacement Magnitude Displacement Direction Inter-Stroke time Muhammad Shahzad

Stroke, Inter-stroke times Muhammad Shahzad

Displacement Magnitude Muhammad Shahzad

Velocity Magnitude Volunteer 1 Volunteer 2 Muhammad Shahzad

Device Acceleration Volunteer 1 Volunteer 2 Muhammad Shahzad

GEAT Working Mechanism

How GEAT works Collect training samples Generate classification model Securely unlock the phone Muhammad Shahzad

Classification Model Noise removal Features for classification Classifier training and Gesture ranking Muhammad Shahzad

Simple Moving Average (Low Pass Filter) Noise Removal Simple Moving Average (Low Pass Filter) Muhammad Shahzad

Features for Classification Features used Stroke time Inter-stroke time Displacement magnitude Displacement direction Velocity magnitude Velocity direction Device Acceleration Stroke based features Sub-stroke based features Muhammad Shahzad

Feature Selection Selected Discarded Muhammad Shahzad

Classifier training Single class classification Support Vector Distribution Estimation (SVDE) RBF kernel Grid search for optimal classifier parameters Gesture Ranking Muhammad Shahzad

Securely unlocking the device Accepted Rejected Accepted Majority Voting Decision: Accepted Muhammad Shahzad

Handling Multiple Behaviors Segregate the samples from different behaviors Generate Minimum Variance Partitions Agglomerative Hierarchical Clustering Wards Linkage Train classifiers for each cluster Test an unknown sample against each cluster Muhammad Shahzad

Experimental Evaluation

Accuracy Evaluation Single gesture Three gestures Avg EER Avg EER 4.8% with DA 6.8% without DA Avg EER 1.7% with DA 3.7% without DA Muhammad Shahzad

Multiple Behaviors Muhammad Shahzad

Effect of System Parameters Muhammad Shahzad

Conclusion Proposed a gesture based authentication scheme Improves security and usability Resilient to shoulder surfing attacks and smudge attacks Handles multiple user behaviors Evaluation through simulations and real world experiments More in the paper Detailed data analysis Technical details of extracting multiple behaviors determining duration and locations of sub-strokes classifier training more evaluation Muhammad Shahzad

Questions? Muhammad Shahzad