10.1145/2638728.2641710acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

My thoughts are not your thoughts

Published:13 September 2014Publication History

ABSTRACT

Authenticating users of computer systems based on their brainwave signals is now a realistic possibility, made possible by the increasing availability of EEG (electroencephalography) sensors in wireless headsets and wearable devices. This possibility is especially interesting because brainwave-based authentication naturally meets the criteria for two-factor authentication. To pass an authentication test using brainwave signals, a user must have both an inherence factor (his or her brain) and a knowledge factor (a chosen passthought). In this study, we investigate the extent to which both factors are truly necessary. In particular, we address the question of whether an attacker may gain advantage from information about a given target's secret thoughts.

References

  1. Bionym Nymi. http://www.bionym.com/.Google ScholarGoogle Scholar
  2. Ashby, C., Bhatia, A., Tenore, F., and Vogelstein, J. Low-cost electroencephalogram (eeg) based authentication. In Proceedings of 5th International IEEE EMBS Conference on Neural Engineering (April 2011).Google ScholarGoogle ScholarCross RefCross Ref
  3. Chuang, J., Nguyen, H., Wang, C., and Johnson, B. I think, therefore i am: Usability and security of authentication using brainwaves. In Proceedings of 2013 Workshop on Usable Security (2013).Google ScholarGoogle ScholarCross RefCross Ref
  4. Devices, P. N. Press release: Pnd wearable environment. http://personalneuro.com/, 2014. {Online; accessed 30-May-2014}.Google ScholarGoogle Scholar
  5. Killourhy, K. S., and Maxion, R. A. Comparing anomaly detectors for keystroke dynamics. In Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009), IEEE Computer Society Press (June 2009), 125--134.Google ScholarGoogle Scholar
  6. Marcel, S., and del R. Millan, J. Person authentication using brainwaves (eeg) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 4 (April 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., and Song, D. On the feasibility of side-channel attacks with brain-computer interfaces. In Proceedings of 21st Usenix Security Symposium (Usenix Security) (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Monrose, F., and Rubin, A. Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security, ACM (1997), 48--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Palaniappan, R. Electroencephalogram signals from imagined activities: A novel biometric identifier for a small population. In IDEAL 2006, LNCS 4224 (2006), 604--611. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Palaniappan, R. Two-stage biometric authentication method using thought activity brain waves. International Journal of Neural Systems 18, 1 (2008), 59--66.Google ScholarGoogle ScholarCross RefCross Ref
  11. Poulos, M., Rangoussi, M., Alexandris, N., and Evangelou, A. Person identification from the eeg using nonlinear signal classification. Methods of Information in Medicine (2002).Google ScholarGoogle Scholar
  12. Thorpe, J., van Oorschot, P., and Somayaji, A. Pass-thoughts: Authenticating with our minds. In Proceedings of the New Security Paradigms Workshop (NSPW) (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. My thoughts are not your thoughts

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
          September 2014
          1409 pages
          ISBN:9781450330473
          DOI:10.1145/2638728

          Copyright © 2014 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 September 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate 481 of 2,574 submissions, 19%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!