Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Advent of non-invasive sensors enables development of data driven authentication systems. For authentication purposes, sensor signal samples and claimed identity of a user are required to indicate whether the signal matches the identity. In this sense, feature extraction and machine learning techniques are used to categorize EEG signal as user or non-user data, respectively. But, chaotic nature of signals such as brain electroencephalograms (EEG) prevent us from perfect classification that leads to various accuracies (other than 100%). In this research, we provide a framework for adversarial analysis of machine learning techniques used in cyber physical authentication systems. We show its usage for EEG based authentication system. In theory, geometrical analysis are performed to compare the space of valid choices for attacker and the total choosing space. The obtained results are compared with expected results from theoretical analysis and the trade-off between security system performance (acceptance rate for valid users) and robustness (number of attacker efforts) is thoroughly analyzed.

Original languageEnglish (US)
Title of host publicationMILCOM 2022 - 2022 IEEE Military Communications Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781665485340
StatePublished - 2022
Event2022 IEEE Military Communications Conference, MILCOM 2022 - Rockville, United States
Duration: Nov 28 2022Dec 2 2022

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM


Conference2022 IEEE Military Communications Conference, MILCOM 2022
Country/TerritoryUnited States

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems'. Together they form a unique fingerprint.

Cite this