Yasmeen Abdrabou, Omar Sherif, Rana Mohamed Eisa, Amr Elmougy
{"title":"基于步态特征的基于人类的欺诈尝试","authors":"Yasmeen Abdrabou, Omar Sherif, Rana Mohamed Eisa, Amr Elmougy","doi":"10.1145/3283458.3283488","DOIUrl":null,"url":null,"abstract":"Recent research involves biometrics in authentication as they establish a natural way of communication. Accordingly, in this paper, we describe the implementation of an Android-based authentication application and we focus on human factor impostor attacks on gait based systems. We used the smartphone's built-in accelerometer to record gait cycles while walking. Results proved that imitating other's gait cycles is possible and can be a huge threat.","PeriodicalId":186364,"journal":{"name":"Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Human-based fraudulent attempts on gait based profiles\",\"authors\":\"Yasmeen Abdrabou, Omar Sherif, Rana Mohamed Eisa, Amr Elmougy\",\"doi\":\"10.1145/3283458.3283488\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent research involves biometrics in authentication as they establish a natural way of communication. Accordingly, in this paper, we describe the implementation of an Android-based authentication application and we focus on human factor impostor attacks on gait based systems. We used the smartphone's built-in accelerometer to record gait cycles while walking. Results proved that imitating other's gait cycles is possible and can be a huge threat.\",\"PeriodicalId\":186364,\"journal\":{\"name\":\"Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3283458.3283488\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3283458.3283488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Human-based fraudulent attempts on gait based profiles
Recent research involves biometrics in authentication as they establish a natural way of communication. Accordingly, in this paper, we describe the implementation of an Android-based authentication application and we focus on human factor impostor attacks on gait based systems. We used the smartphone's built-in accelerometer to record gait cycles while walking. Results proved that imitating other's gait cycles is possible and can be a huge threat.