SLIDE 15 5/25/2019 15
Future Work
- Longitudinal study
- Understand longevity of Posture Patterns
- Workplace evaluation
- Adversarial study
- Both casual and determined
29
References
- S. Eberz, K. B. Rasmussen, V. Lenders, and I. Martinovic, Preventing lunchtime attacks: Fighting insider
threats with eye movement biometrics." in Network and Distributed System Security Symposium 2015 (NDSS), Internet Society, San Diego, 2015.
- A. A. Ahmed and I. Traore, “Biometric recognition based on free-text keystroke dynamics,“ in IEEE
Transactions on cybernetics, vol. 44, no. 4, pp. 458-472, 2014.
- M. Conti, G. Lovisotto, I. Martinovic, and G. Tsudik, Fadewich: Fast deauthentication over the wireless
channel," in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017,
- pp. 2294-2301.
- S. Mare, A. M. Markham, C. Cornelius, R. Peterson, and D. Kotz, Zebra: zero-effort bilateral recurring
authentication," in 2014 IEEE Symposium on Security and Privacy (S&P). IEEE, 2014, pp. 705-720.
- Huhta , O , Shrestha , P , Udar , S , Juuti , M , Saxena , N & Asokan , N 2016 , Pitfalls in Designing Zero-Effort
Deauthentication: Opportunistic Human Observation Attacks . in Network and Distributed System Security Symposium 2016 (NDSS). Internet Society , San Diego , pp. 1-14 , Network and Distributed System Security Symposium , San Diego , United States , 21/02/2016 . DOI: 10.14722/ndss.2016.23199
30