Cognitive security for personal devices

Rachel Greenstadt, Jacob Beal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds-for example, computers authenticate users by challenging them to repeat a secret rather than by continually observing the many subtle cues offered by their appearance and behavior. We propose two lines of research that can be combined to produce cognitive security on computers and other personal devices: continuously deployed multi-modal biometrics and adjustably autonomous security.

    Original languageEnglish (US)
    Title of host publicationProceedings of the 1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
    Pages27-30
    Number of pages4
    DOIs
    StatePublished - 2008
    Event1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 - Alexandria, VA, United States
    Duration: Oct 27 2008Oct 31 2008

    Publication series

    NameProceedings of the ACM Conference on Computer and Communications Security
    ISSN (Print)1543-7221

    Conference

    Conference1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
    CountryUnited States
    CityAlexandria, VA
    Period10/27/0810/31/08

    Keywords

    • Artificial intelligence
    • Authentication
    • Biometrics
    • Security automation

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint Dive into the research topics of 'Cognitive security for personal devices'. Together they form a unique fingerprint.

  • Cite this

    Greenstadt, R., & Beal, J. (2008). Cognitive security for personal devices. In Proceedings of the 1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 (pp. 27-30). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1456377.1456383