2022
DOI: 10.1109/tbiom.2022.3206321
|View full text |Cite
|
Sign up to set email alerts
|

GANTouch: An Attack-Resilient Framework for Touch-Based Continuous Authentication System

Abstract: Previous studies have shown that commonly studied (vanilla) implementations of touch-based continuous authentication systems (V-TCAS) are susceptible to active adversarial attempts. This study presents a novel Generative Adversarial Network assisted TCAS (G-TCAS) framework and compares it to the V-TCAS under three active adversarial environments viz. Zero-effort, Population, and Random-vector. The Zero-effort environment was implemented in two variations viz. Zero-effort (same-dataset) and Zero-effort (cross-d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 34 publications
(95 reference statements)
0
1
0
Order By: Relevance
“…They have been tested and evaluated for usability and security, and they demonstrate good resistance to attacks and high detection accuracy. The vulnerability of touch-based continuous authentication systems (TCAS) to active adversarial attacks is investigated in [35]. The significant role of security incidents caused by insiders in attacks against organizations is addressed in [36], which proposes a continuous authentication solution for large multisite enterprises based on Apache Spark, Apache Cassandra, Kafka, and a MySQL database.…”
Section: Related Workmentioning
confidence: 99%
“…They have been tested and evaluated for usability and security, and they demonstrate good resistance to attacks and high detection accuracy. The vulnerability of touch-based continuous authentication systems (TCAS) to active adversarial attacks is investigated in [35]. The significant role of security incidents caused by insiders in attacks against organizations is addressed in [36], which proposes a continuous authentication solution for large multisite enterprises based on Apache Spark, Apache Cassandra, Kafka, and a MySQL database.…”
Section: Related Workmentioning
confidence: 99%
“…However, that would mean everyone needs to have multiple devices. On the other hand, we aim to investigate if the use of deep generative models for generating data and using the same retrain the model would help classifiers sketch a more robust boundary between the genuine and impostor samples [1,2,39,69].…”
Section: Possible Countermeasuresmentioning
confidence: 99%