Touchalytics users, and 29.89% of eDAC users are
vulnerable to impersonation attack.
5 CONCLUDING REMARKS
We constructed and trained the inverse classifier in a
black-box setting by using attack data. The substi-
tute classifier helped the attacker to recover the miss-
ing information of truncated prediction vectors. We
generate input prediction vectors for the trained in-
verse classifier for the fraudulent verification claim,
where every vector has the highest probability value
in the target user’s class. In our experiments, we
used Touchalytics and eDAC data and achieved an
accepted success rate in impersonation attack. Our
work raises a number of research questions, includ-
ing the design of more efficient attacks by improving
the substitute and inverse classifiers. Protecting DNN
classifier of the BA system from this type of attack
can be another future research direction.
ACKNOWLEDGEMENT
This work is in part supported by Natural Sci-
ences and Engineering Research Council of Canada
and Telus Communications Industrial Research Chair
Grant.
REFERENCES
Centeno, M. P., van Moorsel, A., and Castruccio, S.
(2017). Smartphone continuous authentication us-
ing deep learning autoencoders. In 2017 15th An-
nual Conference on Privacy, Security and Trust (PST),
pages 147–1478. IEEE.
Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer,
W. P. (2002). Smote: synthetic minority over-
sampling technique. Journal of artificial intelligence
research, 16:321–357.
Chong, P., Elovici, Y., and Binder, A. (2019). User authen-
tication based on mouse dynamics using deep neural
networks: A comprehensive study. IEEE Transac-
tions on Information Forensics and Security, 15:1086–
1101.
Cover, T. and Hart, P. (1967). Nearest neighbor pattern clas-
sification. IEEE transactions on information theory,
13(1):21–27.
Deng, Y. and Zhong, Y. (2015). Keystroke dynamics
advances for mobile devices using deep neural net-
work. Recent Advances in User Authentication Using
Keystroke Dynamics Biometrics, 2:59–70.
Dosovitskiy, A. and Brox, T. (2016a). Generating images
with perceptual similarity metrics based on deep net-
works. In Advances in neural information processing
systems, pages 658–666.
Dosovitskiy, A. and Brox, T. (2016b). Inverting visual rep-
resentations with convolutional networks. In Proceed-
ings of the IEEE conference on computer vision and
pattern recognition, pages 4829–4837.
Frank, M. et al. (2013a). Touchalytics. http://www.
mariofrank.net/touchalytics/. [Online; accessed 01-
March-2021].
Frank, M. et al. (2013b). Touchalytics: On the applicabil-
ity of touchscreen input as a behavioral biometric for
continuous authentication. IEEE Transactions on In-
formation Forensics and Security, 8(1):136–148.
Fredrikson, M., Jha, S., and Ristenpart, T. (2015). Model
inversion attacks that exploit confidence information
and basic countermeasures. In Proceedings of the
22nd ACM SIGSAC Conference on Computer and
Communications Security, pages 1322–1333.
Hidano, S., Murakami, T., Katsumata, S., Kiyomoto, S., and
Hanaoka, G. (2018). Model inversion attacks for on-
line prediction systems: Without knowledge of non-
sensitive attributes. IEICE Transactions on Informa-
tion and Systems, 101(11):2665–2676.
Islam, M. M. and Safavi-Naini, R. (2016). Poster: A be-
havioural authentication system for mobile users. In
Proceedings of the 2016 ACM Conference on Com-
puter and Communications Security (CCS ’16), pages
1742–1744. ACM.
Islam, M. M. and Safavi-Naini, R. (2021). Draw A Circle
(DAC). https://github.com/mdmorshedul/DAC. [On-
line; accessed 01-March-2021].
Islam, M. M., Safavi-Naini, R., and Kneppers, M. (2021).
Scalable behavioral authentication. IEEE Access,
9:43458–43473.
Jung, D., Nguyen, M. D., Han, J., Park, M., Lee, K., Yoo, S.,
Kim, J., and Mun, K.-R. (2019). Deep neural network-
based gait classification using wearable inertial sensor
data. In 2019 41st Annual International Conference
of the IEEE Engineering in Medicine and Biology So-
ciety (EMBC), pages 3624–3628. IEEE.
Linden, A. and Kindermann, J. (1989). Inversion of multi-
layer nets. In Proc. Int. Joint Conf. Neural Networks,
volume 2, pages 425–430.
Lu, C. X., Du, B., Zhao, P., Wen, H., Shen, Y., Markham,
A., and Trigoni, N. (2018). Deepauth: in-situ au-
thentication for smartwatches via deeply learned be-
havioural biometrics. In Proceedings of the 2018
ACM International Symposium on Wearable Comput-
ers, pages 204–207.
Mahendran, A. and Vedaldi, A. (2015). Understanding deep
image representations by inverting them. In Proceed-
ings of the IEEE conference on computer vision and
pattern recognition, pages 5188–5196.
Mandelbaum, A. and Weinshall, D. (2017). Distance-based
confidence score for neural network classifiers. arXiv
preprint arXiv:1709.09844.
Mo, K., Huang, T., and Xiang, X. (2020). Querying little
is enough: Model inversion attack via latent informa-
Model Inversion for Impersonation in Behavioral Authentication Systems
281