TY - GEN
T1 - Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems
AU - Sadeghi, Koosha
AU - Banerjee, Ayan
AU - Gupta, Sandeep K.S.
N1 - Funding Information: The works of Ayan Banerjee and Sandeep K.S. Gupta are partly funded by DARPA AMP project VOLT. Publisher Copyright: © 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Advent of non-invasive sensors enables development of data driven authentication systems. For authentication purposes, sensor signal samples and claimed identity of a user are required to indicate whether the signal matches the identity. In this sense, feature extraction and machine learning techniques are used to categorize EEG signal as user or non-user data, respectively. But, chaotic nature of signals such as brain electroencephalograms (EEG) prevent us from perfect classification that leads to various accuracies (other than 100%). In this research, we provide a framework for adversarial analysis of machine learning techniques used in cyber physical authentication systems. We show its usage for EEG based authentication system. In theory, geometrical analysis are performed to compare the space of valid choices for attacker and the total choosing space. The obtained results are compared with expected results from theoretical analysis and the trade-off between security system performance (acceptance rate for valid users) and robustness (number of attacker efforts) is thoroughly analyzed.
AB - Advent of non-invasive sensors enables development of data driven authentication systems. For authentication purposes, sensor signal samples and claimed identity of a user are required to indicate whether the signal matches the identity. In this sense, feature extraction and machine learning techniques are used to categorize EEG signal as user or non-user data, respectively. But, chaotic nature of signals such as brain electroencephalograms (EEG) prevent us from perfect classification that leads to various accuracies (other than 100%). In this research, we provide a framework for adversarial analysis of machine learning techniques used in cyber physical authentication systems. We show its usage for EEG based authentication system. In theory, geometrical analysis are performed to compare the space of valid choices for attacker and the total choosing space. The obtained results are compared with expected results from theoretical analysis and the trade-off between security system performance (acceptance rate for valid users) and robustness (number of attacker efforts) is thoroughly analyzed.
UR - http://www.scopus.com/inward/record.url?scp=85147328129&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85147328129&partnerID=8YFLogxK
U2 - 10.1109/MILCOM55135.2022.10017615
DO - 10.1109/MILCOM55135.2022.10017615
M3 - Conference contribution
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 1005
EP - 1010
BT - MILCOM 2022 - 2022 IEEE Military Communications Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2022 IEEE Military Communications Conference, MILCOM 2022
Y2 - 28 November 2022 through 2 December 2022
ER -