Conference paper

SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties


Authors listDehling, F.; Kawelke, S.; Lo Iacono, L.

Appeared inApplied Cryptography and Network Security

Editor listFischlin, M.; Moonsamy, V.

Publication year2015

Pages110-136

ISBN978-3-031-95766-6

eISBN978-3-031-95767-3

DOI Linkhttps://doi.org/10.1007/978-3-031-95767-3_5

Conference23rd International Conference on Applied Cryptography and Network Security

Title of seriesLecture Notes in Computer Science

Number in series15827


Abstract

Continuous authentication (CAuthN) of users extends conventional authentication methods to ensure that only authorized individuals can access resources such as devices or applications while using authenticated sessions. Current research on CAuthN focuses mainly on the extraction of meaningful biometric features and the development of suitable evaluation algorithms. In comparison, systemic aspects that must be equally present for the effective use of CAuthN, such as deployment scenarios and attacker models, have only been insufficiently investigated and appear fragmented in the literature. We conduct a systematic review of the existing CAuthN literature to analyze the body of knowledge concerning scenarios in which CAuthN systems are deployed, the types of attacks they protect against, the integration of CAuthN components into existing IT systems, and their response to detected attacks. We uncover numerous shortcomings and inconsistencies, discuss them, and translate them into research questions that must be addressed before CAuthN systems can be established successfully in practice.




Citation Styles

Harvard Citation styleDehling, F., Kawelke, S. and Lo Iacono, L. (2015) SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties, in Fischlin, M. and Moonsamy, V. (eds.) Applied Cryptography and Network Security. Cham: Springer. pp. 110-136. https://doi.org/10.1007/978-3-031-95767-3_5

APA Citation styleDehling, F., Kawelke, S., & Lo Iacono, L. (2015). SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties. In Fischlin, M., & Moonsamy, V. (Eds.), Applied Cryptography and Network Security. (pp. 110-136). Springer. https://doi.org/10.1007/978-3-031-95767-3_5


Last updated on 2025-05-08 at 09:05