Conditional Generative Adversarial Network for keystroke presentation
attack
- URL: http://arxiv.org/abs/2212.08445v1
- Date: Fri, 16 Dec 2022 12:45:16 GMT
- Title: Conditional Generative Adversarial Network for keystroke presentation
attack
- Authors: Idoia Eizaguirre-Peral, Lander Segurola-Gil, Francesco Zola
- Abstract summary: We propose to study a new approach aiming to deploy a presentation attack towards a keystroke authentication system.
Our idea is to use Conditional Generative Adversarial Networks (cGAN) for generating synthetic keystroke data that can be used for impersonating an authorized user.
Results indicate that the cGAN can effectively generate keystroke dynamics patterns that can be used for deceiving keystroke authentication systems.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybersecurity is a crucial step in data protection to ensure user security
and personal data privacy. In this sense, many companies have started to
control and restrict access to their data using authentication systems.
However, these traditional authentication methods, are not enough for ensuring
data protection, and for this reason, behavioral biometrics have gained
importance. Despite their promising results and the wide range of applications,
biometric systems have shown to be vulnerable to malicious attacks, such as
Presentation Attacks. For this reason, in this work, we propose to study a new
approach aiming to deploy a presentation attack towards a keystroke
authentication system. Our idea is to use Conditional Generative Adversarial
Networks (cGAN) for generating synthetic keystroke data that can be used for
impersonating an authorized user. These synthetic data are generated following
two different real use cases, one in which the order of the typed words is
known (ordered dynamic) and the other in which this order is unknown
(no-ordered dynamic). Finally, both keystroke dynamics (ordered and no-ordered)
are validated using an external keystroke authentication system. Results
indicate that the cGAN can effectively generate keystroke dynamics patterns
that can be used for deceiving keystroke authentication systems.
Related papers
- Evaluation Scheme to Analyze Keystroke Dynamics Methods [0.0]
In this paper, we introduce requirements for biometric authentication and keystroke dynamics.
Results indicate that keystroke dynamics can be used as another authentication method but can be bypassed by stronger adversaries.
arXiv Detail & Related papers (2024-07-23T07:35:33Z) - Securing Voice Authentication Applications Against Targeted Data Poisoning [4.856070170902535]
We propose an enhanced framework using realworld datasets considering realistic attack scenarios.
The results show that the proposed approach is robust, providing accurate authentications even when only a small fraction of the dataset is poisoned.
arXiv Detail & Related papers (2024-06-25T04:52:37Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - KeyDetect --Detection of anomalies and user based on Keystroke Dynamics [0.0]
Cyber attacks can easily access sensitive data like credit card details and social security number.
Currently to stop cyber attacks, various different methods are opted from using two-step verification methods.
We are proposing a technique of using keystroke dynamics (typing pattern) of a user to authenticate the genuine user.
arXiv Detail & Related papers (2023-04-08T09:00:07Z) - Secure and Privacy Preserving Proxy Biometrics Identities [25.272389610447856]
This work proposes a novel approach for generating new artificial fingerprints also called proxy fingerprints.
These proxy biometrics can be generated from original ones only with the help of a user-specific key.
Using the proposed approach a proxy dataset is generated from samples belonging to Anguli fingerprint database.
Matching experiments were performed on the new set which is 5 times larger than the original, and it was found that their performance is at par with 0 FAR and 0 FRR in the stolen key, safe key scenarios.
arXiv Detail & Related papers (2022-12-21T07:02:11Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web
Applications [0.0]
mPSAuth is an approach for continuously tracking various data sources reflecting user behavior and estimating the likelihood of the current user being legitimate.
We show that mPSAuth can provide high accuracy with low encryption and communication overhead, while the effort for the inference is increased to a tolerable extent.
arXiv Detail & Related papers (2022-10-07T12:49:34Z) - Prototype-supervised Adversarial Network for Targeted Attack of Deep
Hashing [65.32148145602865]
deep hashing networks are vulnerable to adversarial examples.
We propose a novel prototype-supervised adversarial network (ProS-GAN)
To the best of our knowledge, this is the first generation-based method to attack deep hashing networks.
arXiv Detail & Related papers (2021-05-17T00:31:37Z) - Backdoor Attack against Speaker Verification [86.43395230456339]
We show that it is possible to inject the hidden backdoor for infecting speaker verification models by poisoning the training data.
We also demonstrate that existing backdoor attacks cannot be directly adopted in attacking speaker verification.
arXiv Detail & Related papers (2020-10-22T11:10:08Z) - Open-set Adversarial Defense [93.25058425356694]
We show that open-set recognition systems are vulnerable to adversarial attacks.
Motivated by this observation, we emphasize the need of an Open-Set Adrial Defense (OSAD) mechanism.
This paper proposes an Open-Set Defense Network (OSDN) as a solution to the OSAD problem.
arXiv Detail & Related papers (2020-09-02T04:35:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.