In a big step toward securing critical information systems, such as medical records in clinical settings, 天美麻豆 researchers have created a new approach to computer security. The methodology authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use the terminal.
天美麻豆鈥檚 Trustworthy Health and Wellness researchers presented at the IEEE Symposium on Security & Privacy earlier this year in San Jose, Calif. THaW is a funded by the National Science Foundation, with 天美麻豆 as the lead institution.
鈥淚n this work, we focused on the de-authentication problem for desktop computers because we were motivated by associated problems faced by healthcare professionals in hospitals,鈥 says the Champion International Professor in the Department of Computer Science and associate dean of faculty for the sciences. Kotz, a member of the (ISTS), is the study鈥檚 senior author and the principal investigator on THaW.
Common authentication methods based on passwords, tokens or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. But users often do not log out, which presents a security risk. The most common solutions鈥攊nactivity timeouts鈥攊nevitably fail security (too long a timeout) or usability (too short a timeout) requirements.
One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Shrirang Mare, a 天美麻豆 computer science PhD student, has developed an approach called Bilateral Recurring Authentication Conducted Effortless, or BRACE. A user wears a bracelet with a built-in accelerometer, gyroscope, and radio on his or her dominant wrist; these bracelets are commonly sold as fitness devices.
鈥淲e wanted to develop a method that does not require any hardware modification to existing devices and does not rely on a user鈥檚 behavior,鈥 says Mare.
When the user interacts with a computer terminal, the bracelet records the person鈥檚 wrist movement, processes it and sends it to the terminal. The terminal compares the wrist movement with the input it receives from the user via keyboard and mouse and confirms the continued presence of the user only if the input correlates.
In experiments, BRACE performed continuous authentication with 85 percent accuracy in verifying the correct user and identified all adversaries within 11 seconds. For a different threshold, one that trades security for usability, BRACE correctly verified 90 percent of users and identified all unauthorized operators within 50 seconds. Thus, BRACE recognizes in under a minute an unauthorized person who steps in to use a terminal when the original user has stepped away it.
This kind of quick reaction can prevent mistakes, such as clinical staff accidentally entering information into the wrong patient鈥檚 medical record, or inappropriate behavior, such as someone examining personal medical information or financial data by taking advantage of a computer left unattended by an authorized user.
鈥淚t would be natural to extend BRACE to mobile devices such as smartphones or tablet computers, and we believe this is possible despite some different challenges,鈥 says Kotz.