Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
  • Program
    • At a Glance
    • Symposium Program
    • 2nd Workshop on Security Information Workers
    • Who Are You?! Adventures in Authentication
    • Workshop on Privacy Indicators
    • Workshop on Security Fatigue
    • Workshop on the Future of Privacy Notices and Indicators: Will Drones Deliver My Privacy Policy?
  • Activities
    • Poster Session
    • Birds-of-a-Feather Sessions
  • Sponsorship
  • Participate
    • Instructions for Authors and Speakers
    • Call for Nominations
    • Call for Papers
    • Call for Posters and Proposals
      • Call for Papers: 2nd Workshop on Security Information Workers
      • Call for Papers: Who are you?! Adventures in Authentication
      • Call for Papers: Workshop on Privacy Indicators
      • Call for Papers: Workshop on Security Fatigue
      • Workshop: Will Drones Deliver My Privacy Policy?
  • About
    • Organizers
    • Past Symposia

sponsors

Gold Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Industry Partner
  • Home
  • Attend
  • Program
  • Activities
  • Sponsorship
  • Participate
  • About

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Authentication Feature and Model Selection using Penalty Algorithms
Tweet

connect with us

Authentication Feature and Model Selection using Penalty Algorithms

Authors: 

Rahul Murmuria and Angelos Stavrou, Kryptowire

Abstract: 

Continuous Authentication (CA) is the process of verifying the identity of the user of an electronic device repeatedly while the device is in use. Existing research in the field employs metrics such as Equal Error Rate (EER) and/or the Receiver Operating Characteristic (ROC) to evaluate the performance in the same way as ‘entry-point’ biometric authentication schemes. These metrics have various shortcomings with regard to CA as they fail to model the practical implications of the authentication process. We would like to discuss and get feedback on performance evaluation techniques that capture practical aspects of the authentication system including the length and frequency of times an impostor reaches different authentication levels and similarly for the genuine user. Our preliminary results show that a multi-level authentication system is not only more accurate than a binary diagnosis but it allows for high level of accuracy. We posit that further research is needed in developing such a metric for truly evaluating a CA system.

Rahul Murmuria, Kryptowire

Angelos Stavrou, Kryptowire

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

Murmuria PDF
  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us