GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

10/02/2022
by   Mohit Agrawal, et al.
19

Previous studies have shown that commonly studied (vanilla) implementations of touch-based continuous authentication systems (V-TCAS) are susceptible to active adversarial attempts. This study presents a novel Generative Adversarial Network assisted TCAS (G-TCAS) framework and compares it to the V-TCAS under three active adversarial environments viz. Zero-effort, Population, and Random-vector. The Zero-effort environment was implemented in two variations viz. Zero-effort (same-dataset) and Zero-effort (cross-dataset). The first involved a Zero-effort attack from the same dataset, while the second used three different datasets. G-TCAS showed more resilience than V-TCAS under the Population and Random-vector, the more damaging adversarial scenarios than the Zero-effort. On average, the increase in the false accept rates (FARs) for V-TCAS was much higher (27.5 Population and Random-vector attacks, respectively. Moreover, we performed a fairness analysis of TCAS for different genders and found TCAS to be fair across genders. The findings suggest that we should evaluate TCAS under active adversarial environments and affirm the usefulness of GANs in the TCAS pipeline.

READ FULL TEXT
research
06/15/2021

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Previous studies have demonstrated that commonly studied (vanilla) touch...
research
10/02/2022

iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

A recent study showed that commonly (vanilla) studied implementations of...
research
04/22/2018

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects

Keystroke timing based active authentication systems are conceptually at...
research
10/01/2021

Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing

Many systems today rely heavily on virtual private network (VPN) technol...
research
12/16/2022

Conditional Generative Adversarial Network for keystroke presentation attack

Cybersecurity is a crucial step in data protection to ensure user securi...
research
04/24/2022

Dictionary Attacks on Speaker Verification

In this paper, we propose dictionary attacks against speaker verificatio...
research
02/07/2019

Shoulder Surfing: From An Experimental Study to a Comparative Framework

Shoulder surfing is an attack vector widely recognized as a real threat ...

Please sign up or login with your details

Forgot password? Click here to reset