Behavioral Authentication with Machine Learning (Sommersemester 2019)
Dozent:
Prof. Dr. Christoph Meinel
(Internet-Technologien und -Systeme)
Tutoren:
M.Sc. Christian Tietz
M.Sc. Eric Klieme
Allgemeine Information
- Semesterwochenstunden: 4
- ECTS: 6
- Benotet:
Ja
- Einschreibefrist: 26.04.2019
- Lehrform: Seminar
- Belegungsart: Wahlpflichtmodul
- Lehrsprache: Deutsch
Studiengänge, Modulgruppen & Module
- IT-Systems Engineering
- IT-Systems Engineering
- IT-Systems Engineering
- IT-Systems Engineering
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-S Spezialisierung
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-T Techniken und Werkzeuge
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-K Konzepte und Methoden
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-S Spezialisierung
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-T Techniken und Werkzeuge
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-K Konzepte und Methoden
- DATA: Data Analytics
- HPI-DATA-T Techniken und Werkzeuge
- DATA: Data Analytics
- HPI-DATA-S Spezialisierung
- PREP: Data Preparation
- HPI-PREP-K Konzepte und Methoden
- PREP: Data Preparation
- HPI-PREP-T Techniken und Werkzeuge
- PREP: Data Preparation
- HPI-PREP-S Spezialisierung
- DATA: Data Analytics
- HPI-DATA-K Konzepte und Methoden
- APAD: Acquisition, Processing and Analysis of Health Data
- HPI-APAD-C Concepts and Methods
- APAD: Acquisition, Processing and Analysis of Health Data
- HPI-APAD-T Technologies and Tools
- APAD: Acquisition, Processing and Analysis of Health Data
- HPI-APAD-S Specialization
Beschreibung
Background
Passwords are used for securing computer systems for a long time. Nevertheless, people use short and weak passwords for their own accounts. The recent identity leaks (Collection#1 -#5) showed how easy these accounts may be compromised. To solve this problem, the Secure Identity Lab of HPI is researching approaches to let the devices (Computer, Smartphones, etc.) recognize their owners. This is done by detecting and evaluating different kind of behavior.
One approach we are following is using the gait of the user to determine a trust level, a probability that the user is also the owner. This trust level is later sent to service providers for authentication. Afterwards, entering a password may not be required anymore.
Problem
There exist several requirements for ‘good’ biometrics and for ‘good’ authentication systems. In the case of biometrics these are e.g. “availability” of the biometric data in many situations or “acceptance” of the user that the data is collected.
In terms of authentication systems there are requirements for low error rates or resistances against several attacks, for example. Referring to our approach described above and the current level of research, a lot of questions are not answered yet.
Goal
In this seminar we want to look at several topics:
- Evaluate typing on smartphones using sensors
- Explore behavioral authentication using the smarthone as mouse
- Apply deep learning to smartphone activity recognition
- Improve user authentication using typing sounds
- ...
Please note that all of our topics are basically general proposals. Please feel free to join our seminar and share your own very special ideas in this field of research.
Topic Presentation
Leistungserfassung
The grade of this course will be based on: two presentations, implementation and a paper.
Termine
Topic Presentation: Monday 08.04. 2019 , 09:15 a.m., room H-E.51
Topic choice until 14.04.2019
Topic assignment: 15.04.2019
Weekly meetings starting on 22.04. , every monday
Extended abstract: TBA
Intermediate presentation: TBA
Final presentation: TBA
Zurück