78 research outputs found

    Leaving the sandbox : third party validation for Java applications.

    Get PDF

    Human-computer interaction in intelligent tutoring systems

    Get PDF
    Due to the rapid evolution of society, citizens are constantly being pressured to obtain new skills through training. The need for qualified people has grown exponentially, which means that the resources for education/training are significantly more limited, so it's necessary to create systems that can solved this problem. The implementation of Intelligent Tutoring Systems (ITS) can be one solution. Besides, ITS aims to enable users to acquire knowledge and develop skills in a specific field. To achieve this goal, the ITS should learn how to react to the actions and needs of the users, and this should be achieved in a non-intrusive and transparent way. In order to provide personalized and adapted system, it is necessary to know the preferences and habits of users. Thus, the ability to learn patterns of behaviour becomes an essential aspect for the successful implementation of an ITS. In this article, we present the student model of an ITS, in order to monitor the user's biometric behaviour and their learning style during e-learning activities. In addition, a machine learning categorization model is presented that oversees student activity during the session. Additionally, this article highlights the main biometric behavioural variations for each activity, making these attributes enable the development of machine learning classifiers to predict users' learning preferences. These results can be instrumental in improving ITS systems in e-learning environments and predict user behaviour based on their interaction with computers or other devices.This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope: UID/CEC/00319/2019

    Secure biometric authentication with improved accuracy

    Get PDF
    We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme

    A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

    Get PDF
    Motivated by typo correction in password authentication, we investigate cryptographic error-correction of secrets in settings where the distribution of secrets is a priori (approximately) known. We refer to this as the distribution-sensitive setting. We design a new secure sketch called the layer-hiding hash (LHH) that offers the best security to date. Roughly speaking, we show that LHH saves an additional log H_0(W) bits of entropy compared to the recent layered sketch construction due to Fuller, Reyzin, and Smith (FRS). Here H_0(W) is the size of the support of the distribution W. When supports are large, as with passwords, our new construction offers a substantial security improvement. We provide two new constructions of typo-tolerant password-based authentication schemes. The first combines a LHH or FRS sketch with a standard slow-to-compute hash function, and the second avoids secure sketches entirely, correcting typos instead by checking all nearby passwords. Unlike the previous such brute-force-checking construction, due to Chatterjee et al., our new construction uses a hash function whose run-time is proportional to the popularity of the password (forcing a longer hashing time on more popular, lower entropy passwords). We refer to this as popularity-proportional hashing (PPH). We then introduce a frame-work for comparing different typo-tolerant authentication approaches. We show that PPH always offers a better time / security trade-off than the LHH and FRS constructions, and for certain distributions outperforms the Chatterjee et al. construction. Elsewhere, this latter construction offers the best trade-off. In aggregate our results suggest that the best known secure sketches are still inferior to simpler brute-force based approaches

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection

    Get PDF
    We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementation of BotSwindler relies upon an out-of-host software agent that drives user-like interactions in a virtual machine, seeking to convince malware residing within the guest OS that it has captured legitimate credentials. To aid in the accuracy and realism of the simulations, we propose a low overhead approach, called virtual machine verification, for verifying whether the guest OS is in one of a predefined set of states. We present results from experiments with real credential-collecting malware that demonstrate the injection of monitored financial bait for detecting compromises. Additionally, using a computational analysis and a user study, we illustrate the believability of the simulations and we demonstrate that they are sufficiently human-like. Finally, we provide results from performance measurements to show our approach does not impose a performance burden

    iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric

    Get PDF
    With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consider a number of on-card verification schemes, the best of which offers an equal error rate of 2.3%. On-card computational time requirements were found to be 3.1 seconds for enrolment and 0.12 seconds for verification. Incorporating our implementation into an existing applet used 684 bytes of program space. Whilst data memory requirements are estimated to be 1400 and 300 bytes for enrolment and verification, respectively. These time and size requirements demonstrate our biometric as a practical proposition for the protection of smart cards. Experiments were performed with the iButton's Java Card platform

    Height and timing of growth spurt during puberty in young people living with vertically acquired HIV in Europe and Thailand.

    Get PDF
    OBJECTIVE: The aim of this study was to describe growth during puberty in young people with vertically acquired HIV. DESIGN: Pooled data from 12 paediatric HIV cohorts in Europe and Thailand. METHODS: One thousand and ninety-four children initiating a nonnucleoside reverse transcriptase inhibitor or boosted protease inhibitor based regimen aged 1-10 years were included. Super Imposition by Translation And Rotation (SITAR) models described growth from age 8 years using three parameters (average height, timing and shape of the growth spurt), dependent on age and height-for-age z-score (HAZ) (WHO references) at antiretroviral therapy (ART) initiation. Multivariate regression explored characteristics associated with these three parameters. RESULTS: At ART initiation, median age and HAZ was 6.4 [interquartile range (IQR): 2.8, 9.0] years and -1.2 (IQR: -2.3 to -0.2), respectively. Median follow-up was 9.1 (IQR: 6.9, 11.4) years. In girls, older age and lower HAZ at ART initiation were independently associated with a growth spurt which occurred 0.41 (95% confidence interval 0.20-0.62) years later in children starting ART age 6 to 10 years compared with 1 to 2 years and 1.50 (1.21-1.78) years later in those starting with HAZ less than -3 compared with HAZ at least -1. Later growth spurts in girls resulted in continued height growth into later adolescence. In boys starting ART with HAZ less than -1, growth spurts were later in children starting ART in the oldest age group, but for HAZ at least -1, there was no association with age. Girls and boys who initiated ART with HAZ at least -1 maintained a similar height to the WHO reference mean. CONCLUSION: Stunting at ART initiation was associated with later growth spurts in girls. Children with HAZ at least -1 at ART initiation grew in height at the level expected in HIV negative children of a comparable age

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner
    corecore