Dictionary Attack on IMU-based Gait Authentication

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems. In particular, this work investigates whether it is possible to build a dictionary of IMUGait patterns and use it to launch an attack or find an imitator who can actively reproduce IMUGait patterns that match the target's IMUGait pattern. Nine physically and demographically diverse individuals walked at various levels of four predefined controllable and adaptable gait factors (speed, step length, step width, and thigh-lift), producing 178 unique IMUGait patterns. Each pattern attacked a wide variety of user authentication models. The deeper analysis of error rates (before and after the attack) challenges the belief that authentication systems based on IMUGait patterns are the most difficult to spoof; further research is needed on adversarial models and associated countermeasures.

Original languageEnglish (US)
Title of host publicationAISec 2023 - Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security
PublisherAssociation for Computing Machinery, Inc
Pages115-126
Number of pages12
ISBN (Electronic)9798400702600
DOIs
StatePublished - Nov 30 2023
Event16th ACM Workshop on Artificial Intelligence and Security, AISec 2023, co-located with CCS 2023 - Copenhagen, Denmark
Duration: Nov 30 2023 → …

Publication series

NameAISec 2023 - Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security

Conference

Conference16th ACM Workshop on Artificial Intelligence and Security, AISec 2023, co-located with CCS 2023
Country/TerritoryDenmark
CityCopenhagen
Period11/30/23 → …

Keywords

  • authentication
  • dictionary attack
  • gait recognition
  • imu sensor
  • presentation attack
  • wearable

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Dictionary Attack on IMU-based Gait Authentication'. Together they form a unique fingerprint.

Cite this