Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique

One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by “organized malicious botnets,” said Daphne Yao, assistant professor of computer science at Virginia Tech.

To combat the “spoofing attacks,” Yao and her former student, Deian Stefan, now a graduate student in the computer science department at Stanford University, developed an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information.

Their work won a best paper award at CollaborateCom ’10, the 6th International Conference on Collaborative Computing, held in Chicago and sponsored by the Institute of Electrical and Electronic Engineers’ Computer Society, Create-Net, and the Institute for Computer Sciences. Continue reading …

Related Posts

A 10-minute guide to Kubernetes Editor: This article was originally published by Omer Dawelbeit under the title "Learn the Kubernetes Key Concepts in 10 Minutes". In this post I w...
Google releases Dart SDK 1.0 for scalable, structured web apps Google has released Dart SDK 1.0. Dart is a "a cross-browser, open source toolkit for structured web applications." It was first announced back in ...
How to create and maintain anonymous email accounts Don't let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous ema...
Sagemath in the Cloud and Sagemath 5.11 Sagemath, or just Sage, a Free Software computational mathematics software, has a hosted service that's in beta testing phase. Sage is a Free Software...
A $204,000 data-privacy violation fine against a company worth $381 billion! France has just handed out a fine against Google for failing to comply with the country's Data Protection Act. What's the fine amount? A measly USD...
How to write the first for loop in R In this tutorial we will have a look at how you can write a basic for loop in R. It is aimed at beginners, and if you’re not yet familiar with the bas...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique — LinuxBSDos.com -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*