Cybersecurity Education and Research
Computer Science Department
Dept. 3315, 1000 E. University ave
Laramie, WY 82071
Email: mike.borowczak@uwyo.edu
Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to validate users over blocks of data. This easily incorporated periodic biometric authentication system validates genuine users and detects intruders using keystroke dynamics. Where other continuous authentication techniques rely on scripted typing, Spy Hunter validates over free text in genuine environments not constrained to obvious authentication checkpoints. Spy Hunter is flexible and can be layered with other authentication mechanisms to provide high-level security.
Project Leads: Shaya Wolf and Danny Radosevich
This research spoofs continuous authentication models using algorithms that utilize limited user data to mimic their biometrics. Currently, SecretAgent uses keystroke timings gathered for the SpyHunter authenticator and runs a simple algorithm to reconstruct press and release times for the user. Then, a script takes an adversary’s typing pattern and fires the key presses at the cadence of the valid user to spoof the authenticator.
Project Leads: Shaya Wolf and Hui Hu
Orpheus is a prudent vocal authentication program that strives to preserve users’ privacy while storing vocal data for user verification. Current speaker recognition systems pose security threats because vocal feature data can be used to reproduce a person’s unique voice, which can compromise a system or expose a user’s private biometric data. Currently, the Orpheus group is building a privacy framework and constructing machine learning models for vocal authentication that measure the amount of biometric data leaked by each model.
Project Leads: Shay Wolf, Andey Tuttle, and Mason Johnson
PacMan is an authentication mechanism built around how a user completes a puzzle, in this case, a simple, randomly generated maze. Other game-based authentication research has shown around 80% accuracy using cognitive data, but higher accuracy is needed. Current attempts revolve around making puzzles/mazes that are complex enough to ensure user behavior is unique, but simple enough that it is not an arduous task.
Cybersecurity Education and Research
Computer Science Department
Dept. 3315, 1000 E. University ave
Laramie, WY 82071
Email: mike.borowczak@uwyo.edu