English
English, 27.03.2020 19:20, katherinemartinez173

It seems like something out of a Robert Ludlum spy novel.

Someone tries to coerce you into revealing your computer

security passwords. You might be tempted to give in, but it is
impossible for you to reveal your authentication credentials.
5 ou do not actually know them because they are safely

buried deep within your subconscious.
Sounds a bit extreme just to make sure no one can log on

to your laptop or smartphone, but a team of researchers from

Stanford and Northwestern universities as well as SRI
10 International is nonetheless experimenting at the computer-,

cognitive- and neuroscience intersection to combat identity

theft and shore up cyber security-by taking advantage of the

human brain’s innate abilities to learn and recognize patterns.
The researchers are studying ways to covertly create and
15 store secret data within the brain's corticostriatal memory

system, which is responsible for reminding us how to do

things. When a person needs to access a computer, network

or some other secure system, they would use special

authentication software designed to tease out that secret data.
20 To test this concept, the researchers devised a computer

game requiring players to tap buttons on a keyboard as large

black dots descending down their screen cross a horizontal

line-very similar in concept to the video game Guitar Hero.

During an initial training session lasting from 30 minutes to
25 an hour, the dots fall at different speeds and in various

locations, forming patterns that repeat until participants

become adept at hitting the appropriate buttons at the right

time. In effect, users' corticostriatal memory becomes adept

at repeating a particular pattern over time, such as dialing a
30 phone number or typing a word on a keyboard without

looking at one's fingers.
The researchers refer to this as "serial interception

sequence learning" training, during which a person

unwittingly learns a specific sequence of keystrokes that can
35 later be used to confirm that person's identity. To log on to,

for example, a Web site, the user would play the game the

same each time that pattern of dots appears, proving his

identity and allowing him access.
"While the planted secret can be used for authentication,
40 the participant cannot be coerced into revealing it since he or

she has no conscious knowledge of it," according to the

researchers in a study they presented August 8 at the

USENIX Security Symposium in Bellevue, Wash. As

currently conceived, the implicit learning approach being
45 tudied might protect against someone either forcing or

tricking you to reveal a password, says lead author Hristo

Bojinov, a Stanford University Ph. D. computer science

candidate. Such coercion could take the form of physical or

verbal threats demanding your password or other security
50 credentials, or it could be a seemingly legitimate phone call

or e-mail designed to coax out this information.
The researchers say they have tested their approach on

370 players so far and continue to add new participants to

their study. The test currently requires at least 30 minutes of
55 training to get reliable results. "It is unlikely that training

time can be shrunk much because this type of brain memory

takes time to get trained," Bojinov says. "It may be possible

to reduce the authentication time [that follows training], but

it is yet to be seen how much." . . .
60 Whether this approach is practical depends upon the

system being defended. It is unlikely, for example, that

Yahoo or Google would implement this approach to security

for their free e-mail services. Would someone want to play a

game for several minutes every time they want to log onto
65 their e-mail? A government facility housing nuclear

weapons, however, could better justify the time commitment

required to log in using the sequence learning method,

particularly if users log in once each day and such an

approach promises to improve security, says Nicolas
70 Christin, associate director of Carnegie Mellon University's Over the course of the passage, the main focus shifts from
(A) a rejection of hypothetical scenarios to the dismissal of these scenarios.
(B) a description of a research study to a discussion of the study’s possible applications.
(C) an explanation of scientific work to an argument about the ethics of using this work in different ways.
(D) the application of one scientific study to a consideration of that study’s results for an entire scientific field.

answer
Answers: 3

Other questions on the subject: English

image
English, 21.06.2019 18:50, lilquongohard
Is the use of another person exact words
Answers: 2
image
English, 21.06.2019 23:20, wreckem
Selectie mellaniswel. anne bradstreet's poems were greatly influenced by which aspects of her upbringing? 1. her education ii. her religion iii. her father a. i and ii b. ii and iii c. i and iii d. i, ii, and iii
Answers: 1
image
English, 22.06.2019 00:00, webbskyler
Why are reading and writing necessary in today’s world?
Answers: 2
image
English, 22.06.2019 07:00, spookymod4845
What is the most likely reason schlosser uses a direct quotation in this example excerpt from fast food nation
Answers: 2
Do you know the correct answer?
It seems like something out of a Robert Ludlum spy novel.

Someone tries to coerce you in...

Questions in other subjects:

Konu
Mathematics, 04.02.2022 14:00
Konu
Mathematics, 04.02.2022 14:00
Konu
Mathematics, 04.02.2022 14:00
Konu
Mathematics, 04.02.2022 14:00
Konu
Mathematics, 04.02.2022 14:00
Konu
Mathematics, 04.02.2022 14:00