Smartphone Impostor Detection with Behavioral Data Privacy and
Minimalist Hardware Support
- URL: http://arxiv.org/abs/2103.06453v1
- Date: Thu, 11 Mar 2021 04:39:53 GMT
- Title: Smartphone Impostor Detection with Behavioral Data Privacy and
Minimalist Hardware Support
- Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee
- Abstract summary: Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information.
This paper proposes a defense-in-depth mechanism to detect impostors quickly with simple Deep Learning algorithms.
We also show how a minimalist hardware module, dubbed SID for Smartphone Impostor Detector, can be designed and integrated into smartphones for self-contained impostor detection.
- Score: 7.374079197112307
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Impostors are attackers who take over a smartphone and gain access to the
legitimate user's confidential and private information. This paper proposes a
defense-in-depth mechanism to detect impostors quickly with simple Deep
Learning algorithms, which can achieve better detection accuracy than the best
prior work which used Machine Learning algorithms requiring computation of
multiple features. Different from previous work, we then consider protecting
the privacy of a user's behavioral (sensor) data by not exposing it outside the
smartphone. For this scenario, we propose a Recurrent Neural Network (RNN)
based Deep Learning algorithm that uses only the legitimate user's sensor data
to learn his/her normal behavior. We propose to use Prediction Error
Distribution (PED) to enhance the detection accuracy. We also show how a
minimalist hardware module, dubbed SID for Smartphone Impostor Detector, can be
designed and integrated into smartphones for self-contained impostor detection.
Experimental results show that SID can support real-time impostor detection, at
a very low hardware cost and energy consumption, compared to other RNN
accelerators.
Related papers
- Online Corrupted User Detection and Regret Minimization [49.536254494829436]
In real-world online web systems, multiple users usually arrive sequentially into the system.
We present an important online learning problem named LOCUD to learn and utilize unknown user relations from disrupted behaviors.
We devise a novel online detection algorithm OCCUD based on RCLUB-WCU's inferred user relations.
arXiv Detail & Related papers (2023-10-07T10:20:26Z) - Your Identity is Your Behavior -- Continuous User Authentication based
on Machine Learning and Touch Dynamics [0.0]
This research used a dataset of touch dynamics collected from 40 subjects using the LG V30+.
The participants played four mobile games, Diep.io, Slither, and Minecraft, for 10 minutes each game.
The results of the research showed that all three algorithms were able to effectively classify users based on their individual touch dynamics.
arXiv Detail & Related papers (2023-04-24T13:45:25Z) - Embedded System Performance Analysis for Implementing a Portable
Drowsiness Detection System for Drivers [2.314847093228566]
We propose an embedded system that can process Ghoddoosian's drowsiness detection algorithm on a small minicomputer.
We use the AioRTC protocol on GitHub to conduct real-time transmission of video frames from the client to the server.
arXiv Detail & Related papers (2022-09-30T00:22:57Z) - A Survey of Machine Learning Algorithms for Detecting Ransomware
Encryption Activity [0.0]
A survey of machine learning techniques trained to detect ransomware is presented.
This work builds upon the efforts of Taylor et al. in using sensor-based methods to identify encryption activity.
A random forest model produces scores of 93% accuracy and 92% F1, showing that sensor-based detection is currently a viable option to detect even zero-day ransomware attacks before the code fully executes.
arXiv Detail & Related papers (2021-10-14T18:02:31Z) - From One to Many: A Deep Learning Coincident Gravitational-Wave Search [58.720142291102135]
We construct a two-detector search for gravitational waves from binary black hole mergers using neural networks trained on non-spinning binary black hole data from a single detector.
We find that none of these simple two-detector networks are capable of improving the sensitivity over applying networks individually to the data from the detectors.
arXiv Detail & Related papers (2021-08-24T13:25:02Z) - Self-Supervised Person Detection in 2D Range Data using a Calibrated
Camera [83.31666463259849]
We propose a method to automatically generate training labels (called pseudo-labels) for 2D LiDAR-based person detectors.
We show that self-supervised detectors, trained or fine-tuned with pseudo-labels, outperform detectors trained using manual annotations.
Our method is an effective way to improve person detectors during deployment without any additional labeling effort.
arXiv Detail & Related papers (2020-12-16T12:10:04Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - Usage Analysis of Mobile Devices [9.686156285265069]
A novel approach of user behaviour detection is proposed with Deep Learning Network (DNN)
Initial approach was to use recurrent neural network (RNN) along with Long Short Term Memory (LSTM) for completely unsupervised analysis of mobile devices.
Next approach is to extract features by using Long Short Term Memory (LSTM) to understand the user behaviour, which are then fed into the Convolution Neural Network (CNN)
arXiv Detail & Related papers (2020-05-13T12:15:24Z) - Efficient Intent Detection with Dual Sentence Encoders [53.16532285820849]
We introduce intent detection methods backed by pretrained dual sentence encoders such as USE and ConveRT.
We demonstrate the usefulness and wide applicability of the proposed intent detectors, showing that they outperform intent detectors based on fine-tuning the full BERT-Large model.
We release our code, as well as a new challenging single-domain intent detection dataset.
arXiv Detail & Related papers (2020-03-10T15:33:54Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z) - Seeing without Looking: Contextual Rescoring of Object Detections for AP
Maximization [4.346179456029563]
We propose to incorporate context in object detection by post-processing the output of an arbitrary detector.
Rescoring is done by conditioning on contextual information from the entire set of detections.
We show that AP can be improved by simply reassigning the detection confidence values.
arXiv Detail & Related papers (2019-12-27T18:56:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.