Contact Us

Cybersecurity Education and Research

Computer Science Department

Dept. 3315, 1000 E. University ave

Laramie, WY 82071

Email: mike.borowczak@uwyo.edu

Find us on Instagram (Link opens a new window)Find us on Facebook (Link opens a new window)Find us on Twitter (Link opens a new window)Find us on LinkedIn (Link opens a new window)Find us on YouTube (Link opens a new window)

ARCADE

The Advanced Research in Continuous Authentication through Dynamic Evaluation (ARCADE) initiative is a group of research projects that aim to increase user accounts' security by using the user's behavior as an authentication method. Current research for which behavioral methods as viable for authentication means include keystroke dynamics and sudoku solving strategies.
Spy hunter logo

Spy Hunter

Project Leads: Shaya Wolf and Rasana Manandhar [Graduated]

Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to validate users over blocks of data. This easily incorporated periodic biometric authentication system validates genuine users and detects intruders using keystroke dynamics. Where other continuous authentication techniques rely on scripted typing, Spy Hunter validates over free text in genuine environments not constrained to obvious authentication checkpoints. Spy Hunter is flexible and can be layered with other authentication mechanisms to provide high-level security.

Secret Agent Cartoon

Secret Agent

Project Leads: Shaya Wolf and Danny Radosevich

This research spoofs continuous authentication models using algorithms that utilize limited user data to mimic their biometrics. Currently, SecretAgent uses keystroke timings gathered for the SpyHunter authenticator and runs a simple algorithm to reconstruct press and release times for the user. Then, a script takes an adversary’s typing pattern and fires the key presses at the cadence of the valid user to spoof the authenticator.

Lyre cartoon

ORPHEUS

Project Leads: Shaya Wolf and Hui Hu

Orpheus is a prudent vocal authentication program that strives to preserve users’ privacy while storing vocal data for user verification. Current speaker recognition systems pose security threats because vocal feature data can be used to reproduce a person’s unique voice, which can compromise a system or expose a user’s private biometric data. Currently, the Orpheus group is building a privacy framework and constructing machine learning models for vocal authentication that measure the amount of biometric data leaked by each model.

Pacman cartoon

PAC-MAN

Project Leads: Shay Wolf, Andey Tuttle, and Mason Johnson

PacMan is an authentication mechanism built around how a user completes a puzzle, in this case, a simple, randomly generated maze. Other game-based authentication research has shown around 80% accuracy using cognitive data, but higher accuracy is needed. Current attempts revolve around making puzzles/mazes that are complex enough to ensure user behavior is unique, but simple enough that it is not an arduous task.

Contact Us

Cybersecurity Education and Research

Computer Science Department

Dept. 3315, 1000 E. University ave

Laramie, WY 82071

Email: mike.borowczak@uwyo.edu

Find us on Instagram (Link opens a new window)Find us on Facebook (Link opens a new window)Find us on Twitter (Link opens a new window)Find us on LinkedIn (Link opens a new window)Find us on YouTube (Link opens a new window)