Neurophysiology and Cyber Security
About
Current text-based authentication systems cannot withstand the situation where the user is forced to release the password under hostile circumstances. An alternative is Coercion Resistant authentication systems which generate passwords that cannot be explained to others, will not be authenticated under pressure, and are not susceptible to brute-force attacks. In this research, we discuss a specific implementation of Coercion Resistant Authentication using an individual's subconscious physiological and neurological responses to music as an authenticating factor.
During a training period the user's physiological responses to music are measured at a base level of relaxation. The user is then played a sample of music that is personally chosen as physiologically or neurologically stimulating by the user. This music is played to the user multiple times and their responses are recorded for each attempt. When the user attempts to log in to the system, they are played the same music they initially selected and their responses are compared to those logged in the system.
The subject's validity is then decided based on the similarity of the collected data and the training data. Based on comparisons made between physiological responses to music from multiple different users, we can show that certain kinds of music can be used to generate authentication material that can be used to provide Coercion Resistant Authentication.
Dr. Mohammad Husain
Max Wolotsky
Project Details
Video
Audio/Visual Explanation
Video coming soon.
Publications/Media
Research Papers & Features
- M.Wolotsky and M. I. Husain. Coercion Resistant Authentication Systems (CRAS) using Physiological Responses to Chill Music. 23rd Usenix Security Symposium (poster session), San Diego, 2014.
- M.Wolotsky, M. I. Husain and E. Choe. Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks. Cryptography and Security Arxiv
- Emerging Technology from the arXiv, "How to Make Passwords That Cannot Be Compromised by Torture or Coercion" May 12, 2016. MIT Technology Review:
Sponsors
This project would not be possible without the help of: