Focused Certification of an Industrial Compilation and Static Verification Toolchain

Author(s):  
Zhi Zhang ◽  
Robby ◽  
John Hatcliff ◽  
Yannick Moy ◽  
Pierre Courtieu
Keyword(s):  
Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4212
Author(s):  
Priscila Morais Argôlo Bonfim Estrela ◽  
Robson de Oliveira Albuquerque ◽  
Dino Macedo Amaral ◽  
William Ferreira Giozza ◽  
Rafael Timóteo de Sousa Júnior

As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple scopes to create more resilient reasoning models and their respective datasets for the improved Biotouch framework. Another contribution highlighted is the testing of these models to evaluate the imposter False Acceptance Error (FAR). This proposal also improves the flow of data and computation within the improved framework. An evaluation of the multiple scope model proposed provides results between 90.68% and 97.05% for the harmonic mean between recall and precision (F1 Score). The percentages of unduly authenticated imposters and errors of legitimate user rejection (Equal Error Rate (EER)) are between 9.85% and 1.88% for static verification, login, user dynamics, and post-login. These results indicate the feasibility of the continuous multiple-scope authentication framework proposed as an effective layer of security for banking applications, eventually operating jointly with conventional measures such as password-based authentication.


2012 ◽  
Vol 38 (3) ◽  
pp. 134-142 ◽  
Author(s):  
P. E. Shved ◽  
V. S. Mutilin ◽  
M. U. Mandrykin

2007 ◽  
Vol 80 (7) ◽  
pp. 1156-1168 ◽  
Author(s):  
Diomidis Spinellis ◽  
Panagiotis Louridas
Keyword(s):  

1997 ◽  
Vol 119 (2) ◽  
pp. 319-326 ◽  
Author(s):  
Ming Hsun Wu ◽  
Jing Yuan Ho ◽  
Wensyang Hsu

In this study, we derive the general equations of motion for the helical spring with a cup damper by considering the damper’s dilation and varying pitch angle of the helical spring. These dynamic equations are simplified to correlate with previous models. The static force-displacement relation is also derived. The extra stiffness due to the damper’s dilation considered in the force-displacement relation is the first such modeling in this area. In addition, a method is presented to predict the compressing spring’s coil close length and is then verified by experimental data. Moreover, the simulation results of the static force-displacement relation are found to correspond to the experimental data. The maximum error is around 0.6 percent.


2016 ◽  
Vol 46 ◽  
pp. 66-90 ◽  
Author(s):  
Elena Planas ◽  
Jordi Cabot ◽  
Cristina Gómez

Sign in / Sign up

Export Citation Format

Share Document