Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Kaczmarek, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.02234  [pdf, other

    cs.CR cs.LG

    Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input

    Authors: Tyler Kaczmarek, Ercan Ozturk, Pier Paolo Tricomi, Gene Tsudik

    Abstract: To date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator: a new post-factum insider attack based on heat transfer caused by a user typing a password on a typical e… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:1806.10189

  2. arXiv:2106.00141  [pdf, other

    cs.CR

    Proactive Provenance Policies for Automatic Cryptographic Data Centric Security

    Authors: Shamaria Engram, Tyler Kaczmarek, Alice Lee, David Bigelow

    Abstract: Data provenance analysis has been used as an assistive measure for ensuring system integrity. However, such techniques are typically reactive approaches to identify the root cause of an attack in its aftermath. This is in part due to fact that the collection of provenance metadata often results in a deluge of information that cannot easily be queried and analyzed in real time. This paper presents… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

  3. arXiv:1806.10189  [pdf, other

    cs.CR

    Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry

    Authors: Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik

    Abstract: As a warm-blooded mammalian species, we humans routinely leave thermal residues on various objects with which we come in contact. This includes common input devices, such as keyboards, that are used for entering (among other things) secret information, such as passwords and PINs. Although thermal residue dissipates over time, there is always a certain time window during which thermal energy readin… ▽ More

    Submitted 10 July, 2018; v1 submitted 26 June, 2018; originally announced June 2018.

  4. arXiv:1708.03978  [pdf, other

    cs.CR

    Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

    Authors: Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik

    Abstract: Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are… ▽ More

    Submitted 13 August, 2017; originally announced August 2017.

  5. arXiv:1706.00056  [pdf, other

    cs.HC

    Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

    Authors: Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik

    Abstract: Human errors in performing security-critical tasks are typically blamed on the complexity of those tasks. However, such errors can also occur because of (possibly unexpected) sensory distractions. A sensory distraction that produces negative effects can be abused by the adversary that controls the environment. Meanwhile, a distraction with positive effects can be artificially introduced to improve… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

  6. The Effect of Visual Noise on The Completion of Security Critical Tasks

    Authors: Tyler Kaczmarek, Alfed Kobsa, Robert Sy, Gene Tsudik

    Abstract: User errors while performing security-critical tasks can lead to undesirable or even disastrous consequences. One major factor influencing mistakes and failures is complexity of such tasks, which has been studied extensively in prior research. Another important issue which hardly received any attention is the impact of both accidental and intended distractions on users performing security-critical… ▽ More

    Submitted 25 August, 2015; v1 submitted 21 May, 2014; originally announced June 2014.

    Comments: 10 pages, 5 figures