subject
English, 27.03.2020 19:20 katherinemartinez173

It seems like something out of a Robert Ludlum spy novel.

Someone tries to coerce you into revealing your computer

security passwords. You might be tempted to give in, but it is
impossible for you to reveal your authentication credentials.
5 ou do not actually know them because they are safely

buried deep within your subconscious.
Sounds a bit extreme just to make sure no one can log on

to your laptop or smartphone, but a team of researchers from

Stanford and Northwestern universities as well as SRI
10 International is nonetheless experimenting at the computer-,

cognitive- and neuroscience intersection to combat identity

theft and shore up cyber security-by taking advantage of the

human brain’s innate abilities to learn and recognize patterns.
The researchers are studying ways to covertly create and
15 store secret data within the brain's corticostriatal memory

system, which is responsible for reminding us how to do

things. When a person needs to access a computer, network

or some other secure system, they would use special

authentication software designed to tease out that secret data.
20 To test this concept, the researchers devised a computer

game requiring players to tap buttons on a keyboard as large

black dots descending down their screen cross a horizontal

line-very similar in concept to the video game Guitar Hero.

During an initial training session lasting from 30 minutes to
25 an hour, the dots fall at different speeds and in various

locations, forming patterns that repeat until participants

become adept at hitting the appropriate buttons at the right

time. In effect, users' corticostriatal memory becomes adept

at repeating a particular pattern over time, such as dialing a
30 phone number or typing a word on a keyboard without

looking at one's fingers.
The researchers refer to this as "serial interception

sequence learning" training, during which a person

unwittingly learns a specific sequence of keystrokes that can
35 later be used to confirm that person's identity. To log on to,

for example, a Web site, the user would play the game the

same each time that pattern of dots appears, proving his

identity and allowing him access.
"While the planted secret can be used for authentication,
40 the participant cannot be coerced into revealing it since he or

she has no conscious knowledge of it," according to the

researchers in a study they presented August 8 at the

USENIX Security Symposium in Bellevue, Wash. As

currently conceived, the implicit learning approach being
45 tudied might protect against someone either forcing or

tricking you to reveal a password, says lead author Hristo

Bojinov, a Stanford University Ph. D. computer science

candidate. Such coercion could take the form of physical or

verbal threats demanding your password or other security
50 credentials, or it could be a seemingly legitimate phone call

or e-mail designed to coax out this information.
The researchers say they have tested their approach on

370 players so far and continue to add new participants to

their study. The test currently requires at least 30 minutes of
55 training to get reliable results. "It is unlikely that training

time can be shrunk much because this type of brain memory

takes time to get trained," Bojinov says. "It may be possible

to reduce the authentication time [that follows training], but

it is yet to be seen how much." . . .
60 Whether this approach is practical depends upon the

system being defended. It is unlikely, for example, that

Yahoo or Google would implement this approach to security

for their free e-mail services. Would someone want to play a

game for several minutes every time they want to log onto
65 their e-mail? A government facility housing nuclear

weapons, however, could better justify the time commitment

required to log in using the sequence learning method,

particularly if users log in once each day and such an

approach promises to improve security, says Nicolas
70 Christin, associate director of Carnegie Mellon University's Over the course of the passage, the main focus shifts from
(A) a rejection of hypothetical scenarios to the dismissal of these scenarios.
(B) a description of a research study to a discussion of the study’s possible applications.
(C) an explanation of scientific work to an argument about the ethics of using this work in different ways.
(D) the application of one scientific study to a consideration of that study’s results for an entire scientific field.

ansver
Answers: 3

Another question on English

question
English, 21.06.2019 16:00
The brother of a presidential candidate writes an editorial in which he defends this candidate against charges of corruption. in such a circumstance, it is most appropriate for the reader to a) suspect that the candidate may have been framed. b) consider whether the candidate has the best family or not. c) wonder if the writer may be biased, due to his family connection. d) wonder if the writer may be inaccurate, due to wanting to get people to read his column. \
Answers: 2
question
English, 22.06.2019 04:00
What are your educational and professional goals and how will this program you achieve your goals?
Answers: 1
question
English, 22.06.2019 07:30
How is the consumption of food used as a symbol in the play? what does food stand for in the play? how does oscar wilde use symbolismin his social commentary? use examples from the play to support your answer.
Answers: 1
question
English, 22.06.2019 08:00
Do you think ms. marvel reflects a growing diversity among comic book readers?
Answers: 1
You know the right answer?
It seems like something out of a Robert Ludlum spy novel.

Someone tries to coerce you in...
Questions
question
Mathematics, 20.10.2020 21:01
question
Mathematics, 20.10.2020 21:01
question
Mathematics, 20.10.2020 21:01
question
Mathematics, 20.10.2020 21:01
question
Mathematics, 20.10.2020 21:01
question
Mathematics, 20.10.2020 21:01
Questions on the website: 13722362