Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique

One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by “organized malicious botnets,” said Daphne Yao, assistant professor of computer science at Virginia Tech.

To combat the “spoofing attacks,” Yao and her former student, Deian Stefan, now a graduate student in the computer science department at Stanford University, developed an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information.

Their work won a best paper award at CollaborateCom ’10, the 6th International Conference on Collaborative Computing, held in Chicago and sponsored by the Institute of Electrical and Electronic Engineers’ Computer Society, Create-Net, and the Institute for Computer Sciences. Continue reading …

Related Posts

Converting Apache Rewrite Rules to Nginx Rewrite Rules Last week we published a blog about Creating NGINX Rewrite Rules. In this complementary blog, we’ll discuss how to convert Apache HTTP server rewr...
482 of the Top500 supercomputers run Linux, and China’s Tianhe-2 is the fastest The November 2013 edition of the list of the world's fastest supercomputers has just been released. Known as the TOP500 List, it is released twice a y...
Android 5.0 Lollipop, Nexus 9 tablet and Nexus 6 phablet Android 5.0, code-named Lollipop, is the latest edition of the most popular mobile operating system on planet Earth. Along with it, Google's also rele...
Nuvola Player needs a new maintainer Nuvola Player is a graphical interface for tuning in to all your Cloud-based music services. I first wrote about it a month ago (see Nuvola Player: En...
Are Web service providers encrypting their data? The Electronic Frontier Foundation has published an infographic list showing the Web service providers that encrypt or don't encrypt their users data ...
Keeping a Global Eye on Copyright Law We spend a lot of our time at EFF trying to spot new proposals in copyright across the world, and understanding whether they're good or bad for civil ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique — LinuxBSDos.com -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*