Please use this identifier to cite or link to this item:
|Title:||Using continuous biometric verification to protect interactive login sessions|
|Authors:||Kumar, S. |
|Source:||Kumar, S.,Sim, T.,Janakiraman, R.,Zhang, S. (2005). Using continuous biometric verification to protect interactive login sessions. Proceedings - Annual Computer Security Applications Conference, ACSAC 2005 : 441-450. ScholarBank@NUS Repository. https://doi.org/10.1109/CSAC.2005.61|
|Abstract:||In this paper we describe the theory, architecture, implementation, and performance of a multi-modal passive biometric verification system that continually verifies the presence/participation of a logged-in user. We assume that the user logged in using strong authentication prior to the starting of the continuous verification process. While the implementation described in the paper combines a digital camera-based face verification with a mouse-based finger-print reader, the architecture is generic enough to accommodate additional biometric devices with different accuracy of classifying a given user from an imposter. The main thrust of our work is to build a multi-modal biometric feedback mechanism into the operating system so that verification failure can automatically lock up the computer within some estimate of the time it takes to subvert the computer. This must be done with low false positives in order to realize a usable system. We show through experimental results that combining multiple suitably chosen modalities in our theoretical framework can effectively do that with currently available off-the-shelf components. © 2005 IEEE.|
|Source Title:||Proceedings - Annual Computer Security Applications Conference, ACSAC|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Dec 13, 2017
checked on Dec 9, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.