Mingjun Ma , Tiantian Zhu , Jie Ying , Yu Cheng , Jiayuan Chen , Jian-Ping Mei , Xue Leng , Xiangyang Zheng , Zhengqiu Weng
{"title":"ThreatCog:一种具有增强运动传感信号的自适应轻量级移动用户认证系统","authors":"Mingjun Ma , Tiantian Zhu , Jie Ying , Yu Cheng , Jiayuan Chen , Jian-Ping Mei , Xue Leng , Xiangyang Zheng , Zhengqiu Weng","doi":"10.1016/j.jisa.2025.104142","DOIUrl":null,"url":null,"abstract":"<div><div>The widespread adoption of mobile applications has driven the development of various user authentication methods for mobile devices. Recently, motion sensor-based mobile user authentication methods have been introduced to offer point-of-entry authentication by utilizing passive sensor data without requiring user interaction. Nonetheless, existing methods based on motion sensor signals face several challenges: (1) inadequate processing of motion sensor data, leading to inaccurate user behavior feature extraction, (2) insufficient capability to capture common user behaviors, and (3) high data requirements and retraining efforts needed when adding new users.</div><div>In this paper, we introduce ThreatCog, a lightweight and adaptive mobile user authentication system that enhances the utilization of motion sensory signals, including accelerometers, gyroscopes, and gravity sensors. To address the first challenge, our method uses signal enhancement technique to make user behavior features more prominent in the data. For the second challenge, during training, the system employs an attention mechanism to extract common behavioral characteristics across users, allowing effective authentication without the need to differentiate between various user behavior contexts. Finally, to overcome the third challenge, the system uses few-shot learning to support new users, validating authentication effectiveness through n-shot testing, where only a small number of samples are required during the registration phase. Extensive experiments on mobile devices demonstrate that ThreatCog enables fast and accurate user authentication. Notably, ThreatCog achieves an impressive 98% accuracy, outperforming SOTA systems.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104142"},"PeriodicalIF":3.8000,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals\",\"authors\":\"Mingjun Ma , Tiantian Zhu , Jie Ying , Yu Cheng , Jiayuan Chen , Jian-Ping Mei , Xue Leng , Xiangyang Zheng , Zhengqiu Weng\",\"doi\":\"10.1016/j.jisa.2025.104142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The widespread adoption of mobile applications has driven the development of various user authentication methods for mobile devices. Recently, motion sensor-based mobile user authentication methods have been introduced to offer point-of-entry authentication by utilizing passive sensor data without requiring user interaction. Nonetheless, existing methods based on motion sensor signals face several challenges: (1) inadequate processing of motion sensor data, leading to inaccurate user behavior feature extraction, (2) insufficient capability to capture common user behaviors, and (3) high data requirements and retraining efforts needed when adding new users.</div><div>In this paper, we introduce ThreatCog, a lightweight and adaptive mobile user authentication system that enhances the utilization of motion sensory signals, including accelerometers, gyroscopes, and gravity sensors. To address the first challenge, our method uses signal enhancement technique to make user behavior features more prominent in the data. For the second challenge, during training, the system employs an attention mechanism to extract common behavioral characteristics across users, allowing effective authentication without the need to differentiate between various user behavior contexts. Finally, to overcome the third challenge, the system uses few-shot learning to support new users, validating authentication effectiveness through n-shot testing, where only a small number of samples are required during the registration phase. Extensive experiments on mobile devices demonstrate that ThreatCog enables fast and accurate user authentication. Notably, ThreatCog achieves an impressive 98% accuracy, outperforming SOTA systems.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"93 \",\"pages\":\"Article 104142\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001796\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001796","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals
The widespread adoption of mobile applications has driven the development of various user authentication methods for mobile devices. Recently, motion sensor-based mobile user authentication methods have been introduced to offer point-of-entry authentication by utilizing passive sensor data without requiring user interaction. Nonetheless, existing methods based on motion sensor signals face several challenges: (1) inadequate processing of motion sensor data, leading to inaccurate user behavior feature extraction, (2) insufficient capability to capture common user behaviors, and (3) high data requirements and retraining efforts needed when adding new users.
In this paper, we introduce ThreatCog, a lightweight and adaptive mobile user authentication system that enhances the utilization of motion sensory signals, including accelerometers, gyroscopes, and gravity sensors. To address the first challenge, our method uses signal enhancement technique to make user behavior features more prominent in the data. For the second challenge, during training, the system employs an attention mechanism to extract common behavioral characteristics across users, allowing effective authentication without the need to differentiate between various user behavior contexts. Finally, to overcome the third challenge, the system uses few-shot learning to support new users, validating authentication effectiveness through n-shot testing, where only a small number of samples are required during the registration phase. Extensive experiments on mobile devices demonstrate that ThreatCog enables fast and accurate user authentication. Notably, ThreatCog achieves an impressive 98% accuracy, outperforming SOTA systems.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.