Traditional authentication mechanisms use passwords, PINs and biometrics, but these only authenticate at the point of entry. Continuous authentication schemes instead allow systems to verify identity and mitigate unauthorised access continuously. However, recent developments in generative modelling can significantly threaten continuous authentication systems, allowing attackers to craft adversarial examples to gain unauthorised access and may even limit a legitimate user from accessing protected data in the network. The research available on the use of generative models for attacking continuous authentication is relatively scarce. This paper explores the feasibility of bypassing continuous authentication using generative models, measuring the impact of the damage, and advising the usage of metrics to compare the various advertised attacks in such a system. Our empirical results demonstrate that generative models cause a higher Equal Error Rate and misclassification error in attack scenarios. At the same time, training and detection time during attack scenarios is increased compared to perturbation models. The results prove that data samples crafted by generative models can be a severe threat to continuous authentication schemes using motion sensor data.
Generative adversarial attacks on motion-based continuous authentication schemes
Generative adversarial attacks on motion-based continuous authentication schemes
Generative adversarial attacks on motion-based continuous authentication schemes
Related Content
Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence of camcorder piracy, this paper conducts an in-depth study of the luminance flicker that is naturally present in camcorded videos due to the interplay between a liquid-crystal-d…
We report a new neural backdoor attack, named Hibernated Backdoor, which is stealthy, aggressive and devastating. The backdoor is planted in a hibernated mode to avoid being detected. Once deployed and fine-tuned on end devices, the hibernated backdoor turns into the active state that can be exploited by the attacker. To the best of our knowledge, this is the fi…
"The geographic data and timestamps of subscribers held by mobile carriers have long been used by law enforcement and intelligence agencies to conduct legal investigations, largescale surveillance, or even unconstitutional search. Meanwhile, with the surge in popularity of Location-based Services (LBS) over the past decade, selling the geolocation information of…
Webinar /Jun 2024
Blog Post /Jun 2025
Blog Post /Jun 2025