머신러닝 기반의 차세대 사용자 인증 연구 동향 분석

  • Published : 2018.02.26

Abstract

Keywords

References

  1. 김종현, "인공지능 기반 금융권 보안관제 동향 및 향후 과제", 전자금융과 금융보안, 제8호, pp. 41-42, 금융보안원, 2017.
  2. "제4차 산업혁명에 대응한 지능정보사회 중장기 종합 대책", 미래창조과학부, 2016.
  3. M. Barreno, B. Nelson, A. D. Joseph and J. D. Tygar, "The security of machine learning," Machine Learning, Vol. 81, No. 2, pp. 121-148, 2010. https://doi.org/10.1007/s10994-010-5188-5
  4. S. B. Kotsiantis, I. Zaharakis and P. Pintelas "Supervised machine learning: A review of classification techniques", 2007.
  5. T. Hastie, R. Tibshirani, J. Friedman and J. Franklin, "The elements of statistical learning: data mining, inference and prediction", The Mathematical Intelligencer, Vol. 27, No. 2, pp.83-85, 2005.
  6. B. Ur, F. Noma, J. Bees, S. M. Segreti, R. Shay, L. Bauer and L. F. Cranor, "I added '!' at the end to make it secure": Observing password creation in the lab", In Proc. SOUPS, 2015.
  7. F. Schaub, R. Deyhle and M. Weber, "Password entry usability and shoulder surf�ing susceptibility on different smartphone platforms". In Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p.13, 2012.
  8. A. J. Aviv, K. L. Gibson, E. Mossop, M. Blaze and J. M. Smith, "Smudge Attacks on Smartphone Touch Screens", Woot, Vol. 10, pp. 1-7, 2010.
  9. M. Harbach, E. V. Zezschwitz, A. Fichtner, A. D. Luca and M. Smith, "It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception", In Symposium on usable privacy and security (SOUPS), pp. 9-11, 2014.
  10. M. Shoaib, S. Bosch, O. D. Incel and H. Scholten, "A survey of online activity recognition using mobile phones", Sensors, Vol. 15, No. 1, pp. 2059-2085, 2015. https://doi.org/10.3390/s150102059
  11. J. Li, K. Cheng, S. Wang, F. Morstatter, R. P. Trevino, J. Tang and H. Liu, "Feature selection: A data perspective", ACM Computing Surveys (CSUR), Vol. 50, No. 6, p. 94, 2017.
  12. L. Li, X. Zhao and G. Xue, "Unobservable Re-authentication for Smartphones", In NDSS, 2013
  13. H. Xu, Y. Zhou and M. R. Lyu, "Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones", In Symposium On Usable Privacy and Security, SOUPS, Vol. 14, pp. 187-198, 2014.
  14. A. Buriro, B. Crispo, F. DelFrari and K. Wrona, "Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication", In Security and Privacy Workshops (SPW), pp. 276-285, 2016.
  15. Z. Sitova, J. Sedenka, Q. Yang, G. Peng, G. Zhou, P. Gasti and K. S. Balagani, "HMOG: New behavioral biometric features for continuous authentication of smartphone users", IEEE Transactions on Information Forensics and Security, Vol. 11, No. 5, pp. 877-892, 2016. https://doi.org/10.1109/TIFS.2015.2506542
  16. W. H. Lee, X. Liu, Y. Shen, H. Jin, and R. B. Lee, "Secure pick up: Implicit authentication when you start using the smartphone", In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 67-78, 2017.
  17. T. J. Neal, D. L. Woodard and A. D. Striegel, "Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits", In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on IEEE, pp. 1-6, 2015.
  18. L. Fridman, S. Weber, R. Greenstadt and M. Kam, "Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location", IEEE Systems Journal, Vol. 11, No. 2, pp. 513-521, 2017. https://doi.org/10.1109/JSYST.2015.2472579