Thinking Unveiled

Very few studies have explored linkages between physiological, such as electroencephalograph (EEG), and behavioral patterns, such as wrist movements. These linkages provide us a unique mechanism to predict one set of patterns from other related patterns. Unlike conventional biometrics, EEG biometrics are hard to spoof using standard presentation attack methods, given the intrinsic liveness resulting from the bounded randomness of EEG signals specific to an individual. In this article, we propose a novel attack on the EEG-based authentication systems by investigating and leveraging the strong correlation between hand movements and brain signals captured through the motion sensors on a smartwatch and the wearable EEG headset, respectively. Based on this technique, we can successfully estimate the user’s EEG signals from the stolen hand movement data while the user was typing on the keyboard. Our attack results on the EEG biometric authentication system show an increase in the mean equal error rates of the classifiers by between 180% and 360% based on a dataset of 59 users. In summary, our pilot study calls for a rethinking of EEG-based authentication mechanisms from the perspective of unique vulnerabilities, particularly for multimodal biometric systems involving a variety of wearable or mobile devices.

[1]  H. Olesen,et al.  ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication System , 2012, IEEE Vehicular Technology Magazine.

[2]  Rodney G. Roberts Roberts Reelected VP for Systems Science and Engineering [Society News] , 2017 .

[3]  Yin Fen Low,et al.  EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique , 2017, IET Biom..

[4]  Heung-Il Suk,et al.  Individual Identification Using Cognitive Electroencephalographic Neurodynamics , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Rajesh Kumar,et al.  Authenticating users through their arm movement patterns , 2016, ArXiv.

[6]  Rusty O. Baldwin,et al.  Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations , 2013, TSEC.

[7]  Matthias Bertram,et al.  Monte-Carlo scatter correction for cone-beam computed tomography with limited scan field-of-view , 2008, SPIE Medical Imaging.

[8]  Danilo P. Mandic,et al.  In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication , 2017, IEEE Transactions on Information Forensics and Security.

[9]  Metin Akay,et al.  Wavelet applications in medicine , 1997 .

[10]  Xinwen Fu,et al.  How privacy leaks from bluetooth mouse? , 2012, CCS '12.

[11]  M. Arns,et al.  Predicting sex from brain rhythms with deep learning , 2018, Scientific Reports.

[12]  T. Inouye,et al.  Quantification of EEG irregularity by use of the entropy of the power spectrum. , 1991, Electroencephalography and clinical neurophysiology.

[13]  Jie Yang,et al.  Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.

[14]  Changki Lee,et al.  Anaphora resolution with pointer networks , 2017, Pattern Recognit. Lett..

[15]  Martin Kracheel,et al.  A Wearable Revolution: Is the smartwatch the next small big thing? , 2014 .

[16]  Zhisheng Niu,et al.  Software-defined hyper-cellular architecture for green and elastic wireless access , 2015, IEEE Communications Magazine.

[17]  Fabio Babiloni,et al.  Gender and Age Related Effects While Watching TV Advertisements: An EEG Study , 2016, Comput. Intell. Neurosci..

[18]  Thomas A. Farmer,et al.  Hand in Motion Reveals Mind in Motion , 2011, Front. Psychology.

[19]  Anindya Maiti,et al.  Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms , 2016, AsiaCCS.

[20]  N. Malmurugan,et al.  Neural classification of lung sounds using wavelet coefficients , 2004, Comput. Biol. Medicine.