{"id":"https://openalex.org/W3203285340","doi":"https://doi.org/10.1109/tdsc.2021.3116552","title":"Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors","display_name":"Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors","publication_year":2021,"publication_date":"2021-09-29","ids":{"openalex":"https://openalex.org/W3203285340","doi":"https://doi.org/10.1109/tdsc.2021.3116552","mag":"3203285340"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3116552","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101623391","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0002-0930-0283"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, RiZhao Information Technology Institute, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, RiZhao Information Technology Institute, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["School of Engineering and Applied Sciences, University at Buffalo, Buffalo, NY, USA"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Applied Sciences, University at Buffalo, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China","School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.375,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.935872,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"19","issue":"6","first_page":"4002","last_page":"4018"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.69031405},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.48862392},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4558041},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42944622},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39651376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32896656},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3285122},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.24083406}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3116552","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.79}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702379"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772383"}],"datasets":[],"versions":[],"referenced_works_count":65,"referenced_works":["https://openalex.org/W1483327747","https://openalex.org/W1505620463","https://openalex.org/W1542405665","https://openalex.org/W1604275567","https://openalex.org/W1685464609","https://openalex.org/W1787539849","https://openalex.org/W1963834459","https://openalex.org/W1964160137","https://openalex.org/W1969860714","https://openalex.org/W1986702455","https://openalex.org/W1987938015","https://openalex.org/W1988463028","https://openalex.org/W2004211009","https://openalex.org/W2007301169","https://openalex.org/W2026365511","https://openalex.org/W2043150635","https://openalex.org/W2048978972","https://openalex.org/W2051267297","https://openalex.org/W2097546075","https://openalex.org/W2101182747","https://openalex.org/W2101807845","https://openalex.org/W2117730228","https://openalex.org/W2119983029","https://openalex.org/W2166266107","https://openalex.org/W2218307818","https://openalex.org/W2296719434","https://openalex.org/W2304245051","https://openalex.org/W2304304210","https://openalex.org/W2404603298","https://openalex.org/W2535690855","https://openalex.org/W2538172027","https://openalex.org/W2548296896","https://openalex.org/W2668140649","https://openalex.org/W2762623186","https://openalex.org/W2766717877","https://openalex.org/W2792557137","https://openalex.org/W2793863604","https://openalex.org/W2794104577","https://openalex.org/W2888940765","https://openalex.org/W2944963830","https://openalex.org/W2945744610","https://openalex.org/W2962861874","https://openalex.org/W2963061824","https://openalex.org/W2963446712","https://openalex.org/W2963778754","https://openalex.org/W2963857521","https://openalex.org/W2964318098","https://openalex.org/W3006433045","https://openalex.org/W3019478474","https://openalex.org/W3033234289","https://openalex.org/W3038214419","https://openalex.org/W3099824492","https://openalex.org/W3101667008","https://openalex.org/W3104966193","https://openalex.org/W3118857593","https://openalex.org/W3119296163","https://openalex.org/W3131158285","https://openalex.org/W3137782885","https://openalex.org/W3152102559","https://openalex.org/W3182377983","https://openalex.org/W3207211939","https://openalex.org/W4254182148","https://openalex.org/W4293321333","https://openalex.org/W785854688","https://openalex.org/W87400274"],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W4315621326","https://openalex.org/W2912135041","https://openalex.org/W2899790217","https://openalex.org/W2611942503","https://openalex.org/W2598865957","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W1576092969","https://openalex.org/W148745890"],"abstract_inverted_index":{"Fingerprint":[0],"authentication":[1,91,225],"has":[2],"gained":[3],"increasing":[4],"popularity":[5],"on":[6,69,135,145,160],"mobile":[7,120,136],"devices":[8,121,137],"in":[9,60],"recent":[10],"years.":[11],"However,":[12],"it":[13],"is":[14,205],"vulnerable":[15],"to":[16,36,45,88],"presentation":[17,39,52],"attacks,":[18],"which":[19,61],"include":[20],"that":[21,173,201],"an":[22,26,62,65,82],"attacker":[23,63],"spoofs":[24,96],"with":[25,185,192],"artificial":[27],"replica.":[28],"Many":[29],"liveness":[30],"detection":[31],"solutions":[32],"have":[33],"been":[34],"proposed":[35],"defeat":[37],"such":[38],"attacks;":[40],"however,":[41],"they":[42],"all":[43],"fail":[44],"defend":[46],"against":[47,207],"a":[48,123],"particular":[49],"type":[50],"of":[51,119,151,183,218],"attack,":[53],"namely":[54],"puppet":[57],"attack":[58],",":[59,81,155,222],"places":[64],"unwilling":[66],"victim's":[67],"finger":[68],"the":[70,113,116,149,167,179,214],"fingerprint":[71,90],"sensor.":[72],"In":[73,210],"this":[74],"article,":[75],"we":[76,156,212],"propose":[77],"FinAuth":[80,107,129,154,176,204,221],"effective":[83],"and":[84,97,115,138,190,227],"efficient":[85],"software-only":[86],"solution,":[87],"complement":[89],"by":[92],"defeating":[93],"both":[94],"synthetic":[95],"puppet":[98],"attacks":[99],"using":[100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">fingertip-touch":[103],"characteristics.":[104],"characterizes":[108],"intrinsic":[109],"fingertip-touch":[110],"behaviors":[111],"including":[112,223],"acceleration":[114],"rotation":[117],"angle":[118],"when":[122],"legitimate":[124],"user":[125,224],"authenticates.":[126],"only":[130],"utilizes":[131],"common":[132],"sensors":[133],"equipped":[134],"does":[139],"not":[140],"introduce":[141],"extra":[142],"usability":[143,215],"burdens":[144],"users.":[146],"To":[147],"evaluate":[148],"effectiveness":[150],"carried":[157],"out":[158],"experiments":[159,198],"datasets":[161],"collected":[162],"from":[163],"90":[164],"subjects":[165],"after":[166],"IRB":[168],"approval.":[169],"The":[170],"results":[171,217],"show":[172],"can":[177],"achieve":[178],"average":[180],"balanced":[181],"accuracy":[182],"96.04%":[184],"5":[186],"training":[187,194],"data":[188,195],"points":[189],"99.28%":[191],"100":[193],"points.":[196],"Security":[197],"also":[199],"demonstrate":[200],"resilient":[206],"possible":[208],"attacks.":[209],"addition,":[211],"report":[213],"analysis":[216],"delay":[226],"overhead.":[228]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3203285340","counts_by_year":[{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-16T18:54:56.486587","created_date":"2021-10-11"}