Simon Eberz
YOU?
Author Swipe
View article: RingAuth: Wearable Authentication using a Smart Ring
RingAuth: Wearable Authentication using a Smart Ring Open
In this paper, we show that by using inertial sensor data generated by a smart ring, worn on the finger, the user can be authenticated when making mobile payments or when knocking on a door (for access control). The proposed system can be …
View article: Techniques for Continuous Touch-Based Authentication Modeling
Techniques for Continuous Touch-Based Authentication Modeling Open
The field of touch-based authentication has been rapidly developing over the last decade, creating a fragmented and difficult-to-navigate area for researchers and application developers alike due to the variety of methods investigated. In …
View article: I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy Open
In this paper, we present AltVoice -- a system designed to help user's protect their privacy when using remotely accessed voice services. The system allows a user to conceal their true voice identity information with no cooperation from th…
View article: BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments
BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments Open
The lack of standard input interfaces in the Internet of Things (IoT) ecosystems presents a challenge in securing such infrastructures. To tackle this challenge, we introduce a novel behavioral biometric system based on naturally occurring…
View article: WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch Open
In this paper, we show that the tap gesture, performed when a user 'taps' a smartwatch onto an NFC-enabled terminal to make a payment, is a biometric capable of implicitly authenticating the user and simultaneously recognising intent-to-pa…
View article: FETA: Fair Evaluation of Touch-based Authentication
FETA: Fair Evaluation of Touch-based Authentication Open
In this paper, we investigate common pitfalls affecting the evaluation of authentication systems based on touch dynamics. We consider different factors that lead to misrepresented performance, are incompatible with stated system and threat…
View article: Daily Turking: Designing Longitudinal Daily-task Studies on Mechanical Turk
Daily Turking: Designing Longitudinal Daily-task Studies on Mechanical Turk Open
In this paper, we present our system design for conducting longitudinal daily-task studies with the same workers throughout on Amazon Mechanical Turk. We implement this system to conduct a study into touch dynamics, and present our experie…
View article: Recurring Turking: Conducting Daily Task Studies on Mechanical Turk.
Recurring Turking: Conducting Daily Task Studies on Mechanical Turk. Open
In this paper, we present our system design for conducting recurring daily studies on Amazon Mechanical Turk. We implement this system to conduct a study into touch dynamics, and present our experiences, challenges and lessons learned from…
View article: Daily Turking: Designing Longitudinal Daily-task Studies on Mechanical\n Turk
Daily Turking: Designing Longitudinal Daily-task Studies on Mechanical\n Turk Open
In this paper, we present our system design for conducting longitudinal\ndaily-task studies with the same workers throughout on Amazon Mechanical Turk.\nWe implement this system to conduct a study into touch dynamics, and present\nour expe…
View article: Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating Open
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update p…
View article: Seeing Red: PPG Biometrics Using Smartphone Cameras
Seeing Red: PPG Biometrics Using Smartphone Cameras Open
In this paper, we propose a system that enables photoplethysmogram\n(PPG)-based authentication by using a smartphone camera. PPG signals are\nobtained by recording a video from the camera as users are resting their finger\non top of the ca…
View article: When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts Open
Attacks on behavioral biometrics have become increasingly popular. Most research has been focused on presenting a previously obtained feature vector to the biometric sensor, often by the attacker training themselves to change their behavio…
View article: Security analysis of behavioural biometrics for continuous authentication
Security analysis of behavioural biometrics for continuous authentication Open
In recent years, behavioural biometrics have become increasingly popular, with many types of behaviour being explored for the purpose of user authentication. Some of the most common examples are keystroke dynamics, mouse movements, touchsc…
View article: Looks Like Eve
Looks Like Eve Open
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 20 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power alon…