Konferenzpaper

SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties


AutorenlisteDehling, F.; Kawelke, S.; Lo Iacono, L.

Erschienen inApplied Cryptography and Network Security

HerausgeberlisteFischlin, M.; Moonsamy, V.

Jahr der Veröffentlichung2015

Seiten110-136

ISBN978-3-031-95766-6

eISBN978-3-031-95767-3

DOI Linkhttps://doi.org/10.1007/978-3-031-95767-3_5

Konferenz23rd International Conference on Applied Cryptography and Network Security

SerientitelLecture Notes in Computer Science

Serienzählung15827


Abstract

Continuous authentication (CAuthN) of users extends conventional authentication methods to ensure that only authorized individuals can access resources such as devices or applications while using authenticated sessions. Current research on CAuthN focuses mainly on the extraction of meaningful biometric features and the development of suitable evaluation algorithms. In comparison, systemic aspects that must be equally present for the effective use of CAuthN, such as deployment scenarios and attacker models, have only been insufficiently investigated and appear fragmented in the literature. We conduct a systematic review of the existing CAuthN literature to analyze the body of knowledge concerning scenarios in which CAuthN systems are deployed, the types of attacks they protect against, the integration of CAuthN components into existing IT systems, and their response to detected attacks. We uncover numerous shortcomings and inconsistencies, discuss them, and translate them into research questions that must be addressed before CAuthN systems can be established successfully in practice.




Zitierstile

Harvard-ZitierstilDehling, F., Kawelke, S. and Lo Iacono, L. (2015) SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties, in Fischlin, M. and Moonsamy, V. (eds.) Applied Cryptography and Network Security. Cham: Springer. pp. 110-136. https://doi.org/10.1007/978-3-031-95767-3_5

APA-ZitierstilDehling, F., Kawelke, S., & Lo Iacono, L. (2015). SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties. In Fischlin, M., & Moonsamy, V. (Eds.), Applied Cryptography and Network Security. (pp. 110-136). Springer. https://doi.org/10.1007/978-3-031-95767-3_5


Zuletzt aktualisiert 2025-05-08 um 09:05