dc.description.abstract | In recent years, smartphones have become indispensable for human. Daily life is closely related to smartphones. Among the application used by the user on the smart-phone, some of the functions involve the user’s important privacy. If the smartphone is stolen, the thief will be able to execute the application and steal private information, which will do great harm to the user. While smart phones bring convenience to life, security has also become an important issue.
In the smartphone authentication, biometrics gradually replaces traditional authentication, provides a more reliable solution by establishing the uniqueness of the user. Most research on biometrics focuses on the accuracy and performance. However, as an authentication system, security must also be an important issue. Although biometrics provides a more reliable and safe mechanism, like other authentication systems, there are potential risks. The input level attack is the most obvious, especially the impersonation attack. The attacker invades the system by mimicking and forging the biological characteristics of the legal user, sends the fake characteristic into the receiver, deceiving the authentication system as the legal user himself. In some survey of behavioral biometrics, it mentioned that attackers may pass the authentication by mimicking the behavior of legal users. To improve the security of behavioral biometric systems, Mimicking attacks must be an important issue.
In this study, we refer to the research method of impersonation attack on other type of behavior biometrics to confirm that current touch-based behavioral authen-tication may get illegal access by mimicking legal user’s behavior. To solve this problem, we seek out the user whose behavior may be easy to mimic, and try to analyze the amount of important feature in the individual of different users to see if there is a relation to the extent of easily mimic for a user. | en_US |