{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:21:31Z","timestamp":1758846091463,"version":"3.44.0"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2025,9,3]]},"abstract":"<jats:p>Mobile devices have become essential in people's daily lives, housing vast amounts of sensitive information through installed applications. To maintain security and protect user privacy, continuous user authentication is crucial even after a login session. However, previous studies have left potential vulnerabilities by separating the authentication process from operations involving sensitive information handling on mobile devices. In this paper, we present Amulet, a click-to-access authentication system that integrates access to sensitive information on mobile devices with the user's identity authentication process, providing ongoing protection against potential adversaries. By leveraging the unique physical structure of each user's finger, we capture the vibration response of their implicit identity traits during finger-screen interactions for sensitive information access. These finger-emitted vibrations (FEV) exhibit distinct and consistent characteristics, allowing us to utilize passive FEV traces for continuous user identification throughout an App's login session. To achieve flexible and robust user authentication, we decouple the FEV biometric features from position- and behavior-dependent vibrations. Our deep learning-based authentication system utilizes collected vibration signals, containing FEV characteristics, as input data. To ensure generalizability across diverse use scenarios, we employ a variational auto-encoder (VAE) to generate synthetic data using a limited input dataset. Additionally, we propose a contrastive learning strategy to disentangle identity-related features from behavior\/position-related features, enhancing the system's resilience to various use scenarios. Evaluation results demonstrate that Amulet achieves high authentication accuracy with a low false positive rate, while maintaining strong robustness against diverse attack vectors.<\/jats:p>","DOI":"10.1145\/3749546","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:15:45Z","timestamp":1756919745000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Amulet: Integrating Sensitive Information Access with Identity Authentication on Mobile Devices"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8268-2951","authenticated-orcid":false,"given":"Daibo","family":"Liu","sequence":"first","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9580-1769","authenticated-orcid":false,"given":"Yunpeng","family":"Feng","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5626-0071","authenticated-orcid":false,"given":"Baixing","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8879-4266","authenticated-orcid":false,"given":"Taiyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4777-7525","authenticated-orcid":false,"given":"Haowen","family":"Chen","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6688-3710","authenticated-orcid":false,"given":"Minjie","family":"Cai","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858547"},{"key":"e_1_2_1_2_1","first-page":"10","volume-title":"21st Annual Computer Security Applications Conference (ACSAC'05)","author":"Suo Xiaoyuan","unstructured":"Xiaoyuan Suo, Ying Zhu, and G Scott Owen. Graphical passwords: A survey. In 21st Annual Computer Security Applications Conference (ACSAC'05), pages 10-pp. IEEE, 2005."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23130"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2062610"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876748"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_2_1_7_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","author":"Frank Mario","year":"2012","unstructured":"Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security, 8(1):136--148, 2012."},{"key":"e_1_2_1_8_1","first-page":"1080","volume-title":"ACM CCS","author":"Zhang Linghan","year":"2016","unstructured":"Linghan Zhang, Sheng Tan, Jie Yang, et al. Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones. In ACM CCS, pages 1080--1091, 2016."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063424"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737969"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975779"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"e_1_2_1_15_1","first-page":"315","volume-title":"ACM MobiCom","author":"Lin Feng","year":"2017","unstructured":"Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, et al. Cardiac scan: A non-contact and continuous heart-based user authentication system. In ACM MobiCom, pages 315--328, 2017."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460725"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3315291"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484553"},{"key":"e_1_2_1_22_1","first-page":"1","volume-title":"The 25th Annual International Conference on Mobile Computing and Networking","author":"Chen Wenqiang","year":"2019","unstructured":"Wenqiang Chen, Lin Chen, Yandao Huang, Xinyu Zhang, Lu Wang, Rukhsana Ruby, and Kaishun Wu. Taprint: Secure text input for commodity smart wristbands. In The 25th Annual International Conference on Mobile Computing and Networking, pages 1--16, 2019."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00101"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3216868"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3368331"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3394437"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23194"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3596236"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107118"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.008"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610894"},{"key":"e_1_2_1_34_1","unstructured":"Fisiolution. Finger structure graph. https:\/\/fisiolution.com\/tag\/dedo-gatillo-bloqueo-dedos-tenosinovitis-estenosante-dedos\/."},{"key":"e_1_2_1_35_1","first-page":"1945","volume-title":"International conference on machine learning","author":"Kusner Matt J","year":"2017","unstructured":"Matt J Kusner, Brooks Paige, and Jos\u00e9 Miguel Hern\u00e1ndez-Lobato. Grammar variational autoencoder. In International conference on machine learning, pages 1945--1954. PMLR, 2017."},{"key":"e_1_2_1_36_1","volume-title":"Engineering student in singapore gets 3d-printed finger after bike accident","author":"Times The Straits","year":"2023","unstructured":"The Straits Times. Engineering student in singapore gets 3d-printed finger after bike accident, 2023."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsvi.1998.2105"},{"key":"e_1_2_1_38_1","volume-title":"Linear vibrations: a theoretical treatment of multi-degree-of-freedom vibrating systems","author":"M\u00fcller Peter Christian","year":"2012","unstructured":"Peter Christian M\u00fcller and Werner Schiehlen. Linear vibrations: a theoretical treatment of multi-degree-of-freedom vibrating systems, volume 7. Springer Science & Business Media, 2012."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.388863"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2160054"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47612-4"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176996454"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643552"},{"issue":"1","key":"e_1_2_1_46_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3643510","article-title":"Range-flexible anti-spoofing face authentication via smartphone acoustic sensing","volume":"8","author":"Xu Zhaopeng","year":"2024","unstructured":"Zhaopeng Xu, Tong Liu, Ruobing Jiang, Pengfei Hu, Zhongwen Guo, and Chao Liu. Aface: Range-flexible anti-spoofing face authentication via smartphone acoustic sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 8(1):26:1--26:33, 2024.","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.753738"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660274"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486283"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354233"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906404"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_2_1_57_1","first-page":"637","volume-title":"Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, SenSys 2022","author":"Han Feiyu","year":"2022","unstructured":"Feiyu Han, Panlong Yang, Haohua Du, and Xiang-Yang Li. Accuth: Anti-spoofing voice authentication via accelerometer. In Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, SenSys 2022, Boston, Massachusetts, November 6-9, 2022, pages 637--650. ACM, 2022."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3749546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:33:06Z","timestamp":1758817986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3749546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1145\/3749546"],"URL":"https:\/\/doi.org\/10.1145\/3749546","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}