What is it about?

This paper investigates the vulnerabilities of gait (walking patterns) based on continuous authentication systems for mobile devices. We designed the first-ever successful attack to breach the security offered by the wearable sensor-based gait biometric.

Featured Image

Why is it important?

Pointed a vulnerability in a biometric system that was considered invincible before this work.

Read the Original

This page is a summary of: Treadmill attack on gait-based authentication systems, September 2015, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/btas.2015.7358801.
You can read the full text:

Read

Contributors

The following have contributed to this page