What is it about?
This paper investigates the vulnerabilities of gait (walking patterns) based on continuous authentication systems for mobile devices. We designed the first-ever successful attack to breach the security offered by the wearable sensor-based gait biometric.
Featured Image
Photo by Farrel Nobel on Unsplash
Why is it important?
Pointed a vulnerability in a biometric system that was considered invincible before this work.
Read the Original
This page is a summary of: Treadmill attack on gait-based authentication systems, September 2015, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/btas.2015.7358801.
You can read the full text:
Contributors
The following have contributed to this page