Dictionary Attack on IMU-based Gait Authentication
We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Kumar, Rajesh Isik, Can Mohan, Chilukuri K |
description | We present a novel adversarial model for authentication systems that use gait
patterns recorded by the inertial measurement unit (IMU) built into
smartphones. The attack idea is inspired by and named after the concept of a
dictionary attack on knowledge (PIN or password) based authentication systems.
In particular, this work investigates whether it is possible to build a
dictionary of IMUGait patterns and use it to launch an attack or find an
imitator who can actively reproduce IMUGait patterns that match the target's
IMUGait pattern. Nine physically and demographically diverse individuals walked
at various levels of four predefined controllable and adaptable gait factors
(speed, step length, step width, and thigh-lift), producing 178 unique IMUGait
patterns. Each pattern attacked a wide variety of user authentication models.
The deeper analysis of error rates (before and after the attack) challenges the
belief that authentication systems based on IMUGait patterns are the most
difficult to spoof; further research is needed on adversarial models and
associated countermeasures. |
doi_str_mv | 10.48550/arxiv.2309.11766 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2309_11766</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2309_11766</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-a159f7b1673c1f4fd5f34e55efc03a4e1c4b7bfe2388d2d2da11b5afc011e8313</originalsourceid><addsrcrecordid>eNotzjkOwjAQBVA3FAg4ABW-QEIm3kIZsUsgmlBHY8cWFhBQMAhuT1g0xS_m6-sRMoQk5pkQyRibp3_EKUsmMYCSskvSmTfBX2psXjQPAc2RXmq63u4jjTdb0SX6QPN7ONg6eIOfap90HJ5udvDPHikW82K6ija75XqabyKUSkYIYuKUBqmYAcddJRzjVgjrTMKQWzBcK-1syrKsSttDAC2w_QLYjAHrkdFv9osur40_t8jygy-_ePYGmBU-tA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Dictionary Attack on IMU-based Gait Authentication</title><source>arXiv.org</source><creator>Kumar, Rajesh ; Isik, Can ; Mohan, Chilukuri K</creator><creatorcontrib>Kumar, Rajesh ; Isik, Can ; Mohan, Chilukuri K</creatorcontrib><description>We present a novel adversarial model for authentication systems that use gait
patterns recorded by the inertial measurement unit (IMU) built into
smartphones. The attack idea is inspired by and named after the concept of a
dictionary attack on knowledge (PIN or password) based authentication systems.
In particular, this work investigates whether it is possible to build a
dictionary of IMUGait patterns and use it to launch an attack or find an
imitator who can actively reproduce IMUGait patterns that match the target's
IMUGait pattern. Nine physically and demographically diverse individuals walked
at various levels of four predefined controllable and adaptable gait factors
(speed, step length, step width, and thigh-lift), producing 178 unique IMUGait
patterns. Each pattern attacked a wide variety of user authentication models.
The deeper analysis of error rates (before and after the attack) challenges the
belief that authentication systems based on IMUGait patterns are the most
difficult to spoof; further research is needed on adversarial models and
associated countermeasures.</description><identifier>DOI: 10.48550/arxiv.2309.11766</identifier><language>eng</language><subject>Computer Science - Computer Vision and Pattern Recognition ; Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2023-09</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2309.11766$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2309.11766$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Kumar, Rajesh</creatorcontrib><creatorcontrib>Isik, Can</creatorcontrib><creatorcontrib>Mohan, Chilukuri K</creatorcontrib><title>Dictionary Attack on IMU-based Gait Authentication</title><description>We present a novel adversarial model for authentication systems that use gait
patterns recorded by the inertial measurement unit (IMU) built into
smartphones. The attack idea is inspired by and named after the concept of a
dictionary attack on knowledge (PIN or password) based authentication systems.
In particular, this work investigates whether it is possible to build a
dictionary of IMUGait patterns and use it to launch an attack or find an
imitator who can actively reproduce IMUGait patterns that match the target's
IMUGait pattern. Nine physically and demographically diverse individuals walked
at various levels of four predefined controllable and adaptable gait factors
(speed, step length, step width, and thigh-lift), producing 178 unique IMUGait
patterns. Each pattern attacked a wide variety of user authentication models.
The deeper analysis of error rates (before and after the attack) challenges the
belief that authentication systems based on IMUGait patterns are the most
difficult to spoof; further research is needed on adversarial models and
associated countermeasures.</description><subject>Computer Science - Computer Vision and Pattern Recognition</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzjkOwjAQBVA3FAg4ABW-QEIm3kIZsUsgmlBHY8cWFhBQMAhuT1g0xS_m6-sRMoQk5pkQyRibp3_EKUsmMYCSskvSmTfBX2psXjQPAc2RXmq63u4jjTdb0SX6QPN7ONg6eIOfap90HJ5udvDPHikW82K6ija75XqabyKUSkYIYuKUBqmYAcddJRzjVgjrTMKQWzBcK-1syrKsSttDAC2w_QLYjAHrkdFv9osur40_t8jygy-_ePYGmBU-tA</recordid><startdate>20230921</startdate><enddate>20230921</enddate><creator>Kumar, Rajesh</creator><creator>Isik, Can</creator><creator>Mohan, Chilukuri K</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20230921</creationdate><title>Dictionary Attack on IMU-based Gait Authentication</title><author>Kumar, Rajesh ; Isik, Can ; Mohan, Chilukuri K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-a159f7b1673c1f4fd5f34e55efc03a4e1c4b7bfe2388d2d2da11b5afc011e8313</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Science - Computer Vision and Pattern Recognition</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Rajesh</creatorcontrib><creatorcontrib>Isik, Can</creatorcontrib><creatorcontrib>Mohan, Chilukuri K</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kumar, Rajesh</au><au>Isik, Can</au><au>Mohan, Chilukuri K</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dictionary Attack on IMU-based Gait Authentication</atitle><date>2023-09-21</date><risdate>2023</risdate><abstract>We present a novel adversarial model for authentication systems that use gait
patterns recorded by the inertial measurement unit (IMU) built into
smartphones. The attack idea is inspired by and named after the concept of a
dictionary attack on knowledge (PIN or password) based authentication systems.
In particular, this work investigates whether it is possible to build a
dictionary of IMUGait patterns and use it to launch an attack or find an
imitator who can actively reproduce IMUGait patterns that match the target's
IMUGait pattern. Nine physically and demographically diverse individuals walked
at various levels of four predefined controllable and adaptable gait factors
(speed, step length, step width, and thigh-lift), producing 178 unique IMUGait
patterns. Each pattern attacked a wide variety of user authentication models.
The deeper analysis of error rates (before and after the attack) challenges the
belief that authentication systems based on IMUGait patterns are the most
difficult to spoof; further research is needed on adversarial models and
associated countermeasures.</abstract><doi>10.48550/arxiv.2309.11766</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2309.11766 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2309_11766 |
source | arXiv.org |
subjects | Computer Science - Computer Vision and Pattern Recognition Computer Science - Cryptography and Security Computer Science - Learning |
title | Dictionary Attack on IMU-based Gait Authentication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T21%3A55%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dictionary%20Attack%20on%20IMU-based%20Gait%20Authentication&rft.au=Kumar,%20Rajesh&rft.date=2023-09-21&rft_id=info:doi/10.48550/arxiv.2309.11766&rft_dat=%3Carxiv_GOX%3E2309_11766%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |