TY - GEN
T1 - On humanoid robots imitating human touch gestures on the smart phone
AU - Poudel, Sujit
AU - Serwadda, Abdul
AU - Phoha, Vir V.
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/16
Y1 - 2015/12/16
N2 - We showcase an attack in which an autonomous humanoid robot is trained to execute touch gestures that match those of a target user. Different from past work which addressed a similar problem using a Lego robot, we harness the significant processing power and unique motoric capabilities of the autonomous humanoid robot to implement an attack that: (1) executes touch gestures with high precision, (2) is easily adapted to execute gestures on different touch screen devices, and (3) requires minimal human involvement. Relative to the traditional zero-effort impostor attacks, we show, based on a dataset of 26 users, that our attack significantly degrades the performance of touch-based authentication systems. In addition to the paper highlighting the threat that sophisticated adversaries pose to touch-based authentication systems, our robotic attack design provides a blueprint for much needed impostor testing mechanisms that simulate algorithmic (or sophisticated) adversaries against touch-based authentication systems.
AB - We showcase an attack in which an autonomous humanoid robot is trained to execute touch gestures that match those of a target user. Different from past work which addressed a similar problem using a Lego robot, we harness the significant processing power and unique motoric capabilities of the autonomous humanoid robot to implement an attack that: (1) executes touch gestures with high precision, (2) is easily adapted to execute gestures on different touch screen devices, and (3) requires minimal human involvement. Relative to the traditional zero-effort impostor attacks, we show, based on a dataset of 26 users, that our attack significantly degrades the performance of touch-based authentication systems. In addition to the paper highlighting the threat that sophisticated adversaries pose to touch-based authentication systems, our robotic attack design provides a blueprint for much needed impostor testing mechanisms that simulate algorithmic (or sophisticated) adversaries against touch-based authentication systems.
UR - http://www.scopus.com/inward/record.url?scp=84962920738&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962920738&partnerID=8YFLogxK
U2 - 10.1109/BTAS.2015.7358781
DO - 10.1109/BTAS.2015.7358781
M3 - Conference contribution
AN - SCOPUS:84962920738
T3 - 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015
BT - 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 7th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2015
Y2 - 8 September 2015 through 11 September 2015
ER -