Security

Type me the truth!: detecting deceitful users via keystroke dynamics

In this paper, we propose a novel method, based on keystroke dynamics, to distinguish between fake and truthful personal information written via a computer keyboard. Our method does not need any prior knowledge about the user who is providing data. …

Method for recognizing if a user of an electronic terminal is a human or a robot

A method to recognize whether a user of an electronic terminal is a human or a robot is described. This method provides to take an image and decompose the image in a multitude of image portions. The image portions are randomly visualized inside a …

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning

Network traffic analysis has been widely used for detecting malware at a large-scale network. Nevertheless, the emerging malware variants and zero-day exploits keep posing significant challenges to malware detection systems. In this paper, we propose …

The online identity detection via keyboard dynamics

Around 50% of the world population is now active on internet, often subscribing websites, social networks or other online services. In this scenario, the issue of online faked identities is more and more present, with the phenomena of identity …

Covert lie detection using keyboard dynamics

Identifying the true identity of a subject in the absence of external verification criteria (documents, DNA, fingerprints, etc.) is an unresolved issue. Here, we report an experiment on the verification of fake identities, identified by means of …

Robust smartphone app identification via encrypted network traffic analysis

The apps installed on a smartphone can revealmuch information about a user, such as their medical conditions,sexual orientation, or religious beliefs. Additionally, the presenceor absence of particular apps on a smartphone can informan adversary who …

CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery

Over the last years, most websites on which users can register (e.g., email providers and social networks) adopted CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) as a countermeasure against automated attacks. …

Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic

Automatic fingerprinting and identification of smartphone apps is becoming a very attractive data gathering technique for adversaries, network administrators, investigators and marketing agencies. In fact, the list of apps installed on a device can …