2015
DOI: 10.1007/978-3-319-11933-5_55
|View full text |Cite
|
Sign up to set email alerts
|

Theme Interception Sequence Learning: Deflecting Rubber-Hose Attacks Using Implicit Learning

Abstract: Abstract. Existing cryptographic systems use strong passwords but several techniques are vulnerable to rubber-hose attacks, wherein the user is forced to reveal the secret key. This paper specifies a defense technique against rubberhose attacks by taking advantage of image sequence-based theme selection, dependent on a user's personal construct and active implicit learning. In this paper, an attempt to allow the human brain to generate the password via a computer task of arranging themed images through which t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Studies report comic strips playing a strategic role in expanding the opportunities in teaching and learning, and have shown a decrease in social loneliness and increased satisfaction in students with autism spectrum disorder [15], [16]. An authentication system [17] based on implicit learning from cognitive psychology [18], where passwords were generated using a special task called serial interception sequence learning (SISL) was proposed as a preliminary implementation. Users were trained on a secret key of 30-character length in a 45-minute training session.…”
Section: Introductionmentioning
confidence: 99%
“…Studies report comic strips playing a strategic role in expanding the opportunities in teaching and learning, and have shown a decrease in social loneliness and increased satisfaction in students with autism spectrum disorder [15], [16]. An authentication system [17] based on implicit learning from cognitive psychology [18], where passwords were generated using a special task called serial interception sequence learning (SISL) was proposed as a preliminary implementation. Users were trained on a secret key of 30-character length in a 45-minute training session.…”
Section: Introductionmentioning
confidence: 99%
“…Initial proposals to address coercion attacks are based on generating innovative authentication materials using implicitly learned tasks (i.e. habitual bias in performing a certain task), which could not be consciously explained to an attacker [4,8] and therefore prevented authentication materials from being transferred during a coercion attack. However, these proposals did not explicitly cover the second (and more realistic) scenario of coercion, where an attacker forces the victim to perform the authentication process for them so that the attacker can gain unauthorized access to the system.…”
Section: Introductionmentioning
confidence: 99%