{"title":"Influence of Holding Smart Phone for Acceleration-Based Gait Authentication","authors":"Yuji Watanabe","doi":"10.1109/EST.2014.24","DOIUrl":"https://doi.org/10.1109/EST.2014.24","url":null,"abstract":"In most previous researches on acceleration-based gait authentication, dedicated accelerometers are mounted on hip or ankle, or smart phones are in the pocket in fixed manners. However, when a user walks, smart phone is not only put in the pocket but also used calling or touching on the screen. In these situations, the direction of the phone should be taken into account. In this study, we first improve the application developed in our previous study to record more information such as the rotation of the phone around the 3 axes. And then we perform preliminary experiments using the improved application for 4 subjects to collect the user-generated acceleration data on walk when the phone is held calling and touching as well as in the pocket. The authentication results show that although 1.30% false acceptance rate (FAR) at 2.34% false rejection rate (FRR) is obtained when the phone is in the pocket, the FRR is extremely bad as touching on the screen.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Javier Hernández-Castro, M. Rodríguez-Moreno, David F. Barrero
{"title":"Side-Channel Attack against the Capy HIP","authors":"Carlos Javier Hernández-Castro, M. Rodríguez-Moreno, David F. Barrero","doi":"10.1109/EST.2014.30","DOIUrl":"https://doi.org/10.1109/EST.2014.30","url":null,"abstract":"One of the first approaches to proposed to prevent automated attacks on Internet were the Human Interactive Proofs(HIPs). Since their invention, a variety of designs have been proposed, yet most of them have been successfully attacked. In this paper we focus on a new HIP, based on a puzzle solving scheme, created to increase both security and usability: the Capy CAPTCHA. We have analyzed its design, finding some important flaws. Based on them, we propose a low-cost, side-channel attack. Initial results show that the attack is able to break Capy with a 61% success ratio.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Objects for Indoor Monitoring and Surveillance for Mobile Robots","authors":"Carlos Astua, J. Crespo, R. Barber","doi":"10.1109/EST.2014.35","DOIUrl":"https://doi.org/10.1109/EST.2014.35","url":null,"abstract":"The future of robotics strives to embed robots more and more to human environments every day. One of the tasks in which the robots show a potential application is in the monitoring and surveillance of houses. To achieve this goal, they need to gather information from the environment in a similar way humans do, since the idea is that humans could interact with them the same way a person interacts with another. This paper presents an object detection algorithm focused on semantic information, strives to use current trends in robotics and provides flexibility, so it can be exported to other environments. Semantic navigation enables modeling the environment to an abstraction level close to the one used by humans, facilitating the interaction between the robot and the user, allowing better tasks communication and receiving more complete information from the environment, in addition to increasing the autonomy of the robot. The methods proposed try to recognize objects based on contours and descriptors, and both of them are combined to overcome their deficiencies. Finally, to prove it is accurate and efficient, the code is tested on a real robot.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ideograms Representation for Cognitive Systems in Robotics","authors":"M. Rodríguez-Moreno, A. Stoica","doi":"10.1109/EST.2014.21","DOIUrl":"https://doi.org/10.1109/EST.2014.21","url":null,"abstract":"The cognitive psychology has focused on understanding how humans think and solve problems. As analogy, the robotics systems have used this research to try to make robots more \"intelligent\" imitating cognitive models. How things are perceived and transformed in mental structures, and how they are retained, is still an open question, although a lot of progress has been done. For example, some studies have demonstrated that the use of diagrams retains concepts in memory better than other approaches based on text or words, and making the reasoning about them easier. In this direction, we want to propose an ideogram representation for robotic systems in cooperation with humans that can help to provide a natural link between the determination of perceptive symbols and their manipulation in reasoning.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Assessment of Recent Attacks on Specific Embedded Systems","authors":"Shoaib Ehsan, K. Mcdonald-Maier","doi":"10.1109/EST.2014.11","DOIUrl":"https://doi.org/10.1109/EST.2014.11","url":null,"abstract":"In this paper, we present an assessment of recent attacks on embedded systems, in particular mobile phones, wireless sensor networks, unmanned aerial vehicles and unmanned ground vehicles. As these systems become increasingly connected and networked, the number of attacks on them increases exposing them to real threats and risks, particularly when used in mission critical applications. It is necessary to investigate all aspects of the security systems associated with embedded systems in order to help protect these systems from attackers. In this we present a survey on a number of embedded systems to show system vulnerabilities, recent attacks and the security measurements undertaken to protect the embedded systems.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Risks in Biometric-Based Authentication Control Systems","authors":"Shawn C. Eastwood, S. Yanushkevich","doi":"10.1109/EST.2014.12","DOIUrl":"https://doi.org/10.1109/EST.2014.12","url":null,"abstract":"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132505183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Watabe, T. Minamidani, Hideyashu Sai, Jianting Cao
{"title":"Comparison of Ear Recognition Robustness of Single-View-Based Images Rotated in Depth","authors":"D. Watabe, T. Minamidani, Hideyashu Sai, Jianting Cao","doi":"10.1109/EST.2014.16","DOIUrl":"https://doi.org/10.1109/EST.2014.16","url":null,"abstract":"To improve the robustness against variation in shooting angles, we previously proposed using an asymptotic expansion of the Gabor transform of ear images to compute the Gabor features of other poses and using these estimates in multiple linear discriminant analysis to enhance feature discriminability. Extending this study, the accuracies are compared with other standard methods that can be used to compute feature vectors for other poses, as in principal component analysis and multiple regression analysis.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126922062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting and Identifiying Smartphone Apps Using Icmetrics","authors":"Mustafa Haciosman, Bin Ye, G. Howells","doi":"10.1109/EST.2014.28","DOIUrl":"https://doi.org/10.1109/EST.2014.28","url":null,"abstract":"As web-server spoofing is increasing, we investigate a novel technology termed ICmetrics, used to identify fraud for given software/hardware programs based on measurable quantities/features. ICmetrics technology is based on extracting features from digital systems' operation that may be integrated together to generate unique identifiers for each of the systems or create unique profiles that describe the systems' actual behavior. This paper looks at the properties of the several behaviors as a potential ICmetrics features to identify android apps, it presents several quality features which meet the ICmetrics requirements and can be used for encryption key generation. Finally, the paper identifies four android apps and verifies the use of ICmetrics by identifying a spoofed app as a different app altogether.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier
{"title":"On Secure Group Admission Control Using ICMetrics","authors":"Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier","doi":"10.1109/EST.2014.27","DOIUrl":"https://doi.org/10.1109/EST.2014.27","url":null,"abstract":"The security of a system cannot be certified unless there are formal methods of admission control. Many techniques and protocol have been proposed that try to provide security yet do not focus on the most important question about who has access to the system. When considering group communications it is more important to understand this problem as the security of the system is dependent upon having authorized entities in the group communicating securely. Admission control has previously been studied in distributed systems but repeatedly overlooked in security. In this paper we provide a polling centred admission control system based on ICMetrics. We choose the polling based system as it considers the opinion of current group members when giving access to members wishing to join the group. Our proposed protocol is based on the use of the secure ring signature along with the latest ICMetrics technology.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multispectral Hand Biometrics","authors":"S. Samoil, K. Lai, S. Yanushkevich","doi":"10.1109/EST.2014.10","DOIUrl":"https://doi.org/10.1109/EST.2014.10","url":null,"abstract":"This paper reports on a feasibility study of contactless hand biometrics using an RGB-Depth (RGB-D) camera such as the Kinect v2 prototype. The RGB, depth, and near-infrared (near-IR) spectra provide access to information such as palm print, hand shape, finger joint location, and vein patterns. Extraction of the hand is first done using depth data. The frames with the best palm position are selected, and then correlated into the synchronized RGB and near-IR frames for further processing of the related information in each spectra. Using the hand location information the palm can be extracted in the RGB data for use in palm recognition. Recognition of the palm is performed using Principle Component Analysis and K-Nearest-Neighbors for the classification. This multi-spectral analysis is a pre-requisite for hand shape, palm, and vein recognition to be integrated into a mass access control system or a personal computer secure access system.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}