Suggested: Cyber Security Predictions To Safeguard Your Businesses

Suggested: Cyber Security Predictions to Safeguard your Businesses

Source: Cybersecurity APAC 

Brain Waves Can be Used to Detect Potentially Harmful Personal Information

Cyber security and authentication have been under attack in recent months as, seemingly every other day, a new report of hackers gaining access to private or sensitive information comes to light. Just recently, more than 500 million passwords were stolen when Yahoo revealed its security was compromised.

Brain Waves Can Be Used To Detect Potentially Harmful Personal Information

Securing systems has gone beyond simply coming up with a clever password that could prevent nefarious computer experts from hacking into your Facebook account. The more sophisticated the system, or the more critical, private information that system holds, the more advanced the identification system protecting it becomes.

Fingerprint scans and iris identification are just two types of authentication methods, once thought of as science fiction, that are in wide use by the most secure systems. But fingerprints can be stolen and iris scans can be replicated. Nothing has proven foolproof from being subject to computer hackers.

“The principal argument for behavioral, biometric authentication is that standard modes of authentication, like a password, authenticates you once before you access the service,” said Abdul Serwadda a cybersecurity expert and assistant professor in the Department of Computer Science at Texas Tech University.

“Now, once you’ve accessed the service, there is no other way for the system to still know it is you. The system is blind as to who is using the service. So the area of behavioral authentication looks at other user-identifying patterns that can keep the system aware of the person who is using it. Through such patterns, the system can keep track of some confidence metric about who might be using it and immediately prompt for reentry of the password whenever the confidence metric falls below a certain threshold.”

One of those patterns that is growing in popularity within the research community is the use of brain waves obtained from an electroencephalogram, or EEG. Several research groups around the country have recently showcased systems which use EEG to authenticate users with very high accuracy.

However, those brain waves can tell more about a person than just his or her identity. It could reveal medical, behavioral or emotional aspects of a person that, if brought to light, could be embarrassing or damaging to that person. And with EEG devices becoming much more affordable, accurate and portable and applications being designed that allows people to more readily read an EEG scan, the likelihood of that happening is dangerously high.

“The EEG has become a commodity application. For $100 you can buy an EEG device that fits on your head just like a pair of headphones,” Serwadda said. “Now there are apps on the market, brain-sensing apps where you can buy the gadget, download the app on your phone and begin to interact with the app using your brain signals. That led us to think; now we have these brain signals that were traditionally accessed only by doctors being handled by regular people. Now anyone who can write an app can get access to users’ brain signals and try to manipulate them to discover what is going on.”

That’s where Serwadda and graduate student Richard Matovu focused their attention: attempting to see if certain traits could be gleaned from a person’s brain waves. They presented their findings recently to the Institute of Electrical and Electronics Engineers (IEEE) International Conference on Biometrics.

Brain waves and cybersecurity

Serwadda said the technology is still evolving in terms of being able to use a person’s brain waves for authentication purposes. But it is a heavily researched field that has drawn the attention of several federal organizations. The National Science Foundation (NSF), funds a three-year project on which Serwadda and others from Syracuse University and the University of Alabama-Birmingham are exploring how several behavioral modalities, including EEG brain patterns, could be leveraged to augment traditional user authentication mechanisms.

“There are no installations yet, but a lot of research is going on to see if EEG patterns could be incorporated into standard behavioral authentication procedures,” Serwadda said.

Assuming a system uses EEG as the modality for user authentication, typically for such a system, all variables have been optimized to maximize authentication accuracy. A selection of such variables would include:

The features used to build user templates.      

The signal frequency ranges from which features are extracted

The regions of the brain on which the electrodes are placed, among other variables.

Under this assumption of a finely tuned authentication system, Serwadda and his colleagues tackled the following questions:

If a malicious entity were to somehow access templates from this authentication-optimized system, would he or she be able to exploit these templates to infer non-authentication-centric information about the users with high accuracy?

In the event that such inferences are possible, which attributes of template design could reduce or increase the threat?

Turns out, they indeed found EEG authentication systems to give away non-authentication-centric information. Using an authentication system from UC-Berkeley and a variant of another from a team at Binghamton University and the University of Buffalo, Serwadda and Matovu tested their hypothesis, using alcoholism as the sensitive private information which an adversary might want to infer from EEG authentication templates.

In a study involving 25 formally diagnosed alcoholics and 25 non-alcoholic subjects, the lowest error rate obtained when identifying alcoholics was 25 percent, meaning a classification accuracy of approximately 75 percent.

When they tweaked the system and changed several variables, they found that the ability to detect alcoholic behavior could be tremendously reduced at the cost of slightly reducing the performance of the EEG authentication system.

Motivation for discovery

Serwadda’s motivation for proving brain waves could be used to reveal potentially harmful personal information wasn’t to improve the methods for obtaining that information. It’s to prevent it.

To illustrate, he gives an analogy using fingerprint identification at an airport. Fingerprint scans read ridges and valleys on the finger to determine a person’s unique identity, and that’s it.

In a hypothetical scenario where such systems could only function accurately if the user’s finger was pricked and some blood drawn from it, this would be problematic because the blood drawn by the prick could be used to infer things other than the user’s identity, such as whether a person suffers from certain diseases, such as diabetes.

Given the amount of extra information that EEG authentication systems are able glean about the user, current EEG systems could be likened to the hypothetical fingerprint reader that pricks the user’s finger. Serwadda wants to drive research that develops EEG authentication systems that perform the intended purpose while revealing minimal information about traits other than the user’s identity in authentication terms.

Currently, in the vast majority of studies on the EEG authentication problem, researchers primarily seek to outdo each other in terms of the system error rates. They work with the central objective of designing a system having error rates which are much lower than the state-of-the-art. Whenever a research group develops or publishes an EEG authentication system that attains the lowest error rates, such a system is immediately installed as the reference point.

A critical question that has not seen much attention up to this point is how certain design attributes of these systems, in other words the kinds of features used to formulate the user template, might relate to their potential to leak sensitive personal information. If, for example, a system with the lowest authentication error rates comes with the added baggage of leaking a significantly higher amount of private information, then such a system might, in practice, not be as useful as its low error rates suggest. Users would only accept, and get the full utility of the system, if the potential privacy breaches associated with the system are well understood and appropriate mitigations undertaken.

But, Serwadda said, while the EEG is still being studied, the next wave of invention is already beginning.

“In light of the privacy challenges seen with the EEG, it is noteworthy that the next wave of technology after the EEG is already being developed,” Serwadda said. “One of those technologies is functional near-infrared spectroscopy (fNIRS), which has a much higher signal-to-noise ratio than an EEG. It gives a more accurate picture of brain activity given its ability to focus on a particular region of the brain.”

The good news, for now, is fNIRS technology is still quite expensive; however there is every likelihood that the prices will drop over time, potentially leading to a civilian application to this technology. Thanks to the efforts of researchers like Serwadda, minimizing the leakage of sensitive personal information through these technologies is beginning to gain attention in the research community.

“The basic idea behind this research is to motivate a direction of research which selects design parameters in such a way that we not only care about recognizing users very accurately but also care about minimizing the amount of sensitive personal information it can read,” Serwadda said.

More Posts from Techinfinity and Others

5 years ago
Digital innovations shape the enterprises for the future and equip them with capabilities to address the impending challenges that lie ahead....

Enterprises are moving towards digital trends that are relevant to their business requirements. According to a survey, 85 percent of the enterprise leaders feel that they have just two years to make advancements in terms of digital innovations. 

According to a study, almost half of the organizations’ revenue will be influenced by digital trends by 2020. Here are some of the enterprise technology trends in the coming years.


Tags
6 years ago

Worth a read :)

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

Phew, reading this story was a trip.

Phew, Reading This Story Was A Trip.

TL;DR, this chinese hacker group (successfully) coerced chinese motherboard manufacturing plants into altering the designs for their motherboards to include a tiny chip- no larger than the tip of a pencil- so that they could have control over machines that were later assembled on top of these motherboards further down the supply chain.

Their targets appear to have been large tech corporations (Apple, Amazon were/are affected), as well as positions within the US government/military. Supposedly, no consumer data was stolen or affected.

This thing is so goddamn tiny, and yet it supposedly has the power to alter essentially any instructions that get passed from OS to CPU, as it acts as intermediary in between the RAM and CPU from what I understand. It has network access due to how it’s connected to the baseboard management controller, so it can call home for instructions on what code to run, since… it can do whatever it wants with the cpu, apparently? I’d love to see a more in-depth look into how this technology works, honestly.

Considering this doesn’t seem to affect end users at all, and mostly only has caused harm to large corporations and also the US government/military… my reaction to this is mostly a mixture of “lol” and “holy shit that sounds like something out of a goddamn action movie”.

6 years ago

'Bionic mushrooms' fuse nanotech, bacteria and fungi

In their latest feat of engineering, researchers at Stevens Institute of Technology have taken an ordinary white button mushroom from a grocery store and made it bionic, supercharging it with 3D-printed clusters of cyanobacteria that generate electricity and swirls of graphene nanoribbons that can collect the current.

'Bionic Mushrooms' Fuse Nanotech, Bacteria And Fungi

The work, reported in the Nov. 7 issue of Nano Letters, may sound like something straight out of Alice in Wonderland, but the hybrids are part of a broader effort to better improve our understanding of cells biological machinery and how to use those intricate molecular gears and levers to fabricate new technologies and useful systems for defense, healthcare and the environment.

Keep reading

5 years ago
The adoption of new systems, which make the cities healthier, safer, and more prosperous, has been slower than expected in most cities. Only some regions...

The idea of a smart city is imprinted in the technology sector’s viewpoint diverting technologies to innovate more in the domain. The cities are called smart when technology is incorporated into all fields, raising the level of ease with improved scope for research and development. 

The adoption of these systems into the daily life of the people living in cities, making them healthier, safer, and more prosperous, is occurring at a slower pace than expected. The abrupt hike in artificial intelligence (AI) algorithms, broader availability of low-cost IoT sensors, and distributed hybrid multi-cloud IT architectures have unraveled a plethora of opportunities in the development of smart cities. Factors that drive the growth of interconnected smart cities are: Read More


Tags
5 years ago
The leaders of the public sector expect from government CIOs to look for ways through which technology can minimize costs, build efficiencies, and enhance...

The top 9 strategic technologies for government CIOs were selected based on the public policy needs and business requirements of government enterprises in jurisdictions across the globe.


Tags
5 years ago
Technology helps the governments understand cities better, achieve outcomes, provide services more efficiently by assisting the citizen in embracing the future.

>> Top Homeland Security Companies

>> Top Cloud Consulting Companies

>> Top Cloud Solutions Companies


Tags
6 years ago

The Pathway for Retailers to Attain Better Customer Loyalty

The Pathway For Retailers To Attain Better Customer Loyalty

Today, loyalty programs have become one of the most powerful arsenals used by global retailers to incentivize consumers, ensure repeat business, and subsequently increase ROI. Recent surveys indicated that over 62 percent of these retailers plan on revamping their loyalty offerings next year, while many others are already battle-ready with offers no shopper can ignore.

However, to have a successful loyalty program in place, it is vital that retailers need to understand customers’ behavior and preferences. A global study across retail and hotels published by Oracle Retail highlighted the fact that many organizations have the wrong idea about the end-users’ likes and dislikes.

For example, 58 percent of the retailers believed that consumers would sign up for every program they offered, but in reality, nearly 70 percent of the end-users limit their participation. This shows that organizations need to first understand the mindset that drives customer loyalty perceptions and then develop engaging programs accordingly.

Better Customer Loyalty for Retailers 


Tags
5 years ago
The trends which unraveled a realm of possibilities in the pharma, life sciences, and BioTech industry in 2019 are discussed in detail....
6 years ago

Top Uses of Blockchain That Will Benefit Business

Top Uses Of Blockchain That Will Benefit Business

>>>> http://bit.ly/2Da3dsQ 


Tags
5 years ago
Personalized financial recommendations, automation, and a holistic financial view make the primary factors to impact the retail banking sector significantly.

>> Top Banking analytics companies


Tags
Loading...
End of content
No more pages to load
  • introvertedghostboy
    introvertedghostboy liked this · 8 months ago
  • shygirl-world
    shygirl-world liked this · 4 years ago
  • fuckedupneurodivergent
    fuckedupneurodivergent liked this · 4 years ago
  • pleasantphilosopherwonderland
    pleasantphilosopherwonderland reblogged this · 4 years ago
  • pleasantphilosopherwonderland
    pleasantphilosopherwonderland liked this · 4 years ago
  • hsuol
    hsuol liked this · 5 years ago
  • edd11e
    edd11e reblogged this · 5 years ago
  • atlantisking9000
    atlantisking9000 liked this · 6 years ago
  • a-lamus-d
    a-lamus-d liked this · 6 years ago
  • that-one-feel
    that-one-feel liked this · 6 years ago
  • asemifunctioninghuman
    asemifunctioninghuman liked this · 6 years ago
  • spiritualempathgangster
    spiritualempathgangster reblogged this · 6 years ago
  • jadetheamazing
    jadetheamazing liked this · 6 years ago
  • deathrattleandroll
    deathrattleandroll reblogged this · 6 years ago
  • cortexbraintech
    cortexbraintech liked this · 6 years ago
  • techinfinity
    techinfinity reblogged this · 6 years ago
  • inesbayard
    inesbayard reblogged this · 7 years ago
  • pluvy
    pluvy liked this · 7 years ago
  • liquid-asphalt
    liquid-asphalt liked this · 7 years ago
  • itsblacksapphire
    itsblacksapphire liked this · 7 years ago
  • brandef
    brandef reblogged this · 7 years ago
  • smashdapassrushinganimal
    smashdapassrushinganimal liked this · 7 years ago
  • totalserverking-blog
    totalserverking-blog liked this · 7 years ago
  • marrssun
    marrssun liked this · 7 years ago
  • doctortrench
    doctortrench liked this · 7 years ago
  • cassmeeeeesh-blog
    cassmeeeeesh-blog reblogged this · 7 years ago
  • cassmeeeeesh-blog
    cassmeeeeesh-blog liked this · 7 years ago
  • bartok-not-bartalk
    bartok-not-bartalk reblogged this · 7 years ago
techinfinity - Infinite Technology
Infinite Technology

Your Daily dose of Latest Technology Updates, news, articles across various Industry Sectors

267 posts

Explore Tumblr Blog
Search Through Tumblr Tags