SlideShare a Scribd company logo
368, 7th Street Crosscut road
Gandhipram,
Coimbatore-641012
WWW.CRAPERSOFT.COM
Hackers could use brainwaves to steal
passwords
Researchers at the University of Alabama at Birmingham suggest that brainwave-sensing
headsets, also known as EEG or electroencephalograph headsets, need better security after a
study reveals hackers could guess a user's passwords by monitoring their brainwaves.
EEG headsets are advertised as allowing users to use only their brains to control robotic toys
and video games specifically developed to be played with an EEG headset. There are only a
handful on the market, and they range in price from $150 to $800.
Nitesh Saxena, Ph.D., associate professor in the UAB College of Arts and Sciences
Department of Computer and Information Sciences, Ph.D. student Ajaya Neupane and and
former master's student Md Lutfor Rahman, found that a person who paused a video game
and logged into a bank account while wearing an EEG headset was at risk for having their
passwords or other sensitive data stolen by a malicious software program.
"These emerging devices open immense opportunities for everyday users," Saxena said.
"However, they could also raise significant security and privacy threats as companies work to
develop even more advanced brain-computer interface technology."
Saxena and his team used one EEG headset currently available to consumers online and one
clinical-grade headset used for scientific research to demonstrate how easily a malicious
software program could passively eavesdrop on a user's brainwaves. While typing, a user's
inputs correspond with their visual processing, as well as hand, eye and head muscle
movements. All these movements are captured by EEG headsets. The team asked 12 people
to type a series of randomly generated PINs and passwords into a text box as if they were
logging into an online account while wearing an EEG headset, in order for the software to
train itself on the user's typing and the corresponding brainwave.
"In a real-world attack, a hacker could facilitate the training step required for the malicious
program to be most accurate, by requesting that the user enter a predefined set of numbers in
order to restart the game after pausing it to take a break, similar to the way CAPTCHA is
used to verify users when logging onto websites," Saxena said.
The team found that, after a user entered 200 characters, algorithms within the malicious
software program could make educated guesses about new characters the user entered by
monitoring the EEG data recorded. The algorithm was able to shorten the odds of a hacker's
guessing a four-digit numerical PIN from one in 10,000 to one in 20 and increased the chance
of guessing a six-letter password from about 500,000 to roughly one in 500.
EEG has been used in the medical field for more than half a century as a noninvasive method
for recording electrical activity in the brain. Electrodes are placed on the surface of the scalp
to detect brain waves. An EEG machine then amplifies the signals and records them in a
wave pattern on graph paper or a computer. EEG can be combined with a brain-computer
interface to allow a person to control external devices. This technology was once highly
expensive and used mostly for scientific research, like the production of neuroprosthetic
applications to help disabled patients control prosthetic limbs by thinking about the
movements. However, it is now being marketed to consumers in the form of a wireless
headset and is becoming popular in the gaming and entertainment industries.
"Given the growing popularity of EEG headsets and the variety of ways in which they could
be used, it is inevitable that they will become part of our daily lives, including while using
other devices," Saxena said. "It is important to analyze the potential security and privacy risks
associated with this emerging technology to raise users' awareness of the risks and develop
viable solutions to malicious attacks."
One potential solution proposed by Saxena and his team is the insertion of noise anytime a
user types a password or PIN while wearing an EEG headset.

More Related Content

What's hot

Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
Ninad Bhate
 
Brain fingerprinting
Brain fingerprinting Brain fingerprinting
Brain fingerprinting
Prudhvi Raj
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
Kommineni Pullarao
 
J04302076081
J04302076081J04302076081
J04302076081
ijceronline
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
sanjana
 
Brain fingerprinting padmaja
Brain fingerprinting padmajaBrain fingerprinting padmaja
Brain fingerprinting padmaja
Padmaja Dash
 
BRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGYBRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGY
Divyaprathapraju Divyaprathapraju
 
Brain fingerprinting by ankit 2017............
Brain fingerprinting by ankit 2017............Brain fingerprinting by ankit 2017............
Brain fingerprinting by ankit 2017............
ankitg29
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
Garima Singh
 
Brain finger print
Brain finger printBrain finger print
Brain finger print
Shashank Karamballi
 
Brain finger printing technology
Brain finger printing technologyBrain finger printing technology
Brain finger printing technology
Divyaprathapraju Divyaprathapraju
 
Brainsense -Introduction to brain computer interface
Brainsense -Introduction to brain computer interfaceBrainsense -Introduction to brain computer interface
Brainsense -Introduction to brain computer interface
Pantech ProLabs India Pvt Ltd
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
Blesson Babu
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
Sandeep Singh
 
Brain to brain interface
Brain to brain interfaceBrain to brain interface
Brain to brain interface
VISHAL THAKUR
 
Introduction to Brain Computer Interface
Introduction to Brain Computer InterfaceIntroduction to Brain Computer Interface
Introduction to Brain Computer Interface
Pantech ProLabs India Pvt Ltd
 
BRAIN FINGER PRINT TECHNOLOGY
BRAIN FINGER PRINT TECHNOLOGYBRAIN FINGER PRINT TECHNOLOGY
BRAIN FINGER PRINT TECHNOLOGY
swathi reddy
 
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Vishal Aditya
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
Mohit Arora
 
Brain gate system
Brain gate systemBrain gate system
Brain gate system
Pankaj Tiwari
 

What's hot (20)

Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 
Brain fingerprinting
Brain fingerprinting Brain fingerprinting
Brain fingerprinting
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
J04302076081
J04302076081J04302076081
J04302076081
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
 
Brain fingerprinting padmaja
Brain fingerprinting padmajaBrain fingerprinting padmaja
Brain fingerprinting padmaja
 
BRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGYBRAIN FINGERPRINTING TECHNOLOGY
BRAIN FINGERPRINTING TECHNOLOGY
 
Brain fingerprinting by ankit 2017............
Brain fingerprinting by ankit 2017............Brain fingerprinting by ankit 2017............
Brain fingerprinting by ankit 2017............
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Brain finger print
Brain finger printBrain finger print
Brain finger print
 
Brain finger printing technology
Brain finger printing technologyBrain finger printing technology
Brain finger printing technology
 
Brainsense -Introduction to brain computer interface
Brainsense -Introduction to brain computer interfaceBrainsense -Introduction to brain computer interface
Brainsense -Introduction to brain computer interface
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Brain to brain interface
Brain to brain interfaceBrain to brain interface
Brain to brain interface
 
Introduction to Brain Computer Interface
Introduction to Brain Computer InterfaceIntroduction to Brain Computer Interface
Introduction to Brain Computer Interface
 
BRAIN FINGER PRINT TECHNOLOGY
BRAIN FINGER PRINT TECHNOLOGYBRAIN FINGER PRINT TECHNOLOGY
BRAIN FINGER PRINT TECHNOLOGY
 
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
Brain Game Simulator using BCI | EEG Applications | NeuroSky Minwave
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Brain gate system
Brain gate systemBrain gate system
Brain gate system
 

Similar to Hackers could use brainwaves to steal passwords

Artificial neural networks decode brain activity
Artificial neural networks decode brain activity Artificial neural networks decode brain activity
Artificial neural networks decode brain activity
crapersoft
 
Artificial intelligence turns brain activity into speech
Artificial intelligence turns brain activity into speechArtificial intelligence turns brain activity into speech
Artificial intelligence turns brain activity into speech
usmsystems
 
BrainGate_Technology_PPT.pptx
BrainGate_Technology_PPT.pptxBrainGate_Technology_PPT.pptx
BrainGate_Technology_PPT.pptx
Kunal Kalamkar
 
Password system that are mind control
Password system that are mind controlPassword system that are mind control
Password system that are mind control
vivatechijri
 
Brain Gate Technology (By HasanAli Nodoliya NRI)
Brain Gate Technology (By HasanAli Nodoliya NRI)Brain Gate Technology (By HasanAli Nodoliya NRI)
Brain Gate Technology (By HasanAli Nodoliya NRI)
HasanAli Nodoliya (NRI)
 
1. Brain Computer-Interface
1. Brain Computer-Interface1. Brain Computer-Interface
1. Brain Computer-Interface
Brainware University
 
Brain fingerprinting report
Brain fingerprinting reportBrain fingerprinting report
Brain fingerprinting report
Samyuktha Rani
 
Brainwave seminar
Brainwave seminarBrainwave seminar
Brainwave seminar
Sreeraj. K.R
 
Applying Brain Computer Interface Technology for Playing Games
Applying Brain Computer Interface Technology for Playing GamesApplying Brain Computer Interface Technology for Playing Games
Applying Brain Computer Interface Technology for Playing Games
Dr. Amarjeet Singh
 
Neurotechnology
NeurotechnologyNeurotechnology
Neurotechnology
GraceTrosin1
 
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
Nikolas Perrault
 
Fingerprint Security System using GSM and GPRS
Fingerprint Security System using GSM and GPRSFingerprint Security System using GSM and GPRS
Fingerprint Security System using GSM and GPRS
ijtsrd
 
Brain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headsetBrain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headset
TELKOMNIKA JOURNAL
 
Tech.ppt2
Tech.ppt2Tech.ppt2
Tech.ppt2
bollamneelima
 
Transhumanism and brain
Transhumanism and brainTranshumanism and brain
Transhumanism and brain
2idseminar
 
On the feasibility of side channel attacks with brain-computer interfaces
On the feasibility of side channel attacks with brain-computer interfacesOn the feasibility of side channel attacks with brain-computer interfaces
On the feasibility of side channel attacks with brain-computer interfaces
Karlos Svoboda
 
Brain gate
Brain gateBrain gate
Brain gate
Brati Sundar Nanda
 
Bfp final presentation
Bfp final presentationBfp final presentation
Bfp final presentation
mahesh katragadda
 
Authenticating with our minds
Authenticating with our mindsAuthenticating with our minds
Authenticating with our minds
-jyothish kumar sirigidi
 
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
Victor Asanza
 

Similar to Hackers could use brainwaves to steal passwords (20)

Artificial neural networks decode brain activity
Artificial neural networks decode brain activity Artificial neural networks decode brain activity
Artificial neural networks decode brain activity
 
Artificial intelligence turns brain activity into speech
Artificial intelligence turns brain activity into speechArtificial intelligence turns brain activity into speech
Artificial intelligence turns brain activity into speech
 
BrainGate_Technology_PPT.pptx
BrainGate_Technology_PPT.pptxBrainGate_Technology_PPT.pptx
BrainGate_Technology_PPT.pptx
 
Password system that are mind control
Password system that are mind controlPassword system that are mind control
Password system that are mind control
 
Brain Gate Technology (By HasanAli Nodoliya NRI)
Brain Gate Technology (By HasanAli Nodoliya NRI)Brain Gate Technology (By HasanAli Nodoliya NRI)
Brain Gate Technology (By HasanAli Nodoliya NRI)
 
1. Brain Computer-Interface
1. Brain Computer-Interface1. Brain Computer-Interface
1. Brain Computer-Interface
 
Brain fingerprinting report
Brain fingerprinting reportBrain fingerprinting report
Brain fingerprinting report
 
Brainwave seminar
Brainwave seminarBrainwave seminar
Brainwave seminar
 
Applying Brain Computer Interface Technology for Playing Games
Applying Brain Computer Interface Technology for Playing GamesApplying Brain Computer Interface Technology for Playing Games
Applying Brain Computer Interface Technology for Playing Games
 
Neurotechnology
NeurotechnologyNeurotechnology
Neurotechnology
 
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
Nikolas Perrault | Inside the Creation of the Neural Network that can Unlock ...
 
Fingerprint Security System using GSM and GPRS
Fingerprint Security System using GSM and GPRSFingerprint Security System using GSM and GPRS
Fingerprint Security System using GSM and GPRS
 
Brain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headsetBrain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headset
 
Tech.ppt2
Tech.ppt2Tech.ppt2
Tech.ppt2
 
Transhumanism and brain
Transhumanism and brainTranshumanism and brain
Transhumanism and brain
 
On the feasibility of side channel attacks with brain-computer interfaces
On the feasibility of side channel attacks with brain-computer interfacesOn the feasibility of side channel attacks with brain-computer interfaces
On the feasibility of side channel attacks with brain-computer interfaces
 
Brain gate
Brain gateBrain gate
Brain gate
 
Bfp final presentation
Bfp final presentationBfp final presentation
Bfp final presentation
 
Authenticating with our minds
Authenticating with our mindsAuthenticating with our minds
Authenticating with our minds
 
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
⭐⭐⭐⭐⭐ #IEEE #PRC #YP Puerto Rico and Caribbean (Virtual Summit 2020): Clasifi...
 

Recently uploaded

Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
DebendraDevKhanal1
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 

Recently uploaded (20)

Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 

Hackers could use brainwaves to steal passwords

  • 1. 368, 7th Street Crosscut road Gandhipram, Coimbatore-641012 WWW.CRAPERSOFT.COM Hackers could use brainwaves to steal passwords Researchers at the University of Alabama at Birmingham suggest that brainwave-sensing headsets, also known as EEG or electroencephalograph headsets, need better security after a study reveals hackers could guess a user's passwords by monitoring their brainwaves. EEG headsets are advertised as allowing users to use only their brains to control robotic toys and video games specifically developed to be played with an EEG headset. There are only a handful on the market, and they range in price from $150 to $800. Nitesh Saxena, Ph.D., associate professor in the UAB College of Arts and Sciences Department of Computer and Information Sciences, Ph.D. student Ajaya Neupane and and former master's student Md Lutfor Rahman, found that a person who paused a video game and logged into a bank account while wearing an EEG headset was at risk for having their passwords or other sensitive data stolen by a malicious software program. "These emerging devices open immense opportunities for everyday users," Saxena said. "However, they could also raise significant security and privacy threats as companies work to develop even more advanced brain-computer interface technology." Saxena and his team used one EEG headset currently available to consumers online and one clinical-grade headset used for scientific research to demonstrate how easily a malicious software program could passively eavesdrop on a user's brainwaves. While typing, a user's inputs correspond with their visual processing, as well as hand, eye and head muscle movements. All these movements are captured by EEG headsets. The team asked 12 people to type a series of randomly generated PINs and passwords into a text box as if they were logging into an online account while wearing an EEG headset, in order for the software to train itself on the user's typing and the corresponding brainwave. "In a real-world attack, a hacker could facilitate the training step required for the malicious program to be most accurate, by requesting that the user enter a predefined set of numbers in order to restart the game after pausing it to take a break, similar to the way CAPTCHA is used to verify users when logging onto websites," Saxena said. The team found that, after a user entered 200 characters, algorithms within the malicious software program could make educated guesses about new characters the user entered by monitoring the EEG data recorded. The algorithm was able to shorten the odds of a hacker's guessing a four-digit numerical PIN from one in 10,000 to one in 20 and increased the chance of guessing a six-letter password from about 500,000 to roughly one in 500. EEG has been used in the medical field for more than half a century as a noninvasive method for recording electrical activity in the brain. Electrodes are placed on the surface of the scalp to detect brain waves. An EEG machine then amplifies the signals and records them in a
  • 2. wave pattern on graph paper or a computer. EEG can be combined with a brain-computer interface to allow a person to control external devices. This technology was once highly expensive and used mostly for scientific research, like the production of neuroprosthetic applications to help disabled patients control prosthetic limbs by thinking about the movements. However, it is now being marketed to consumers in the form of a wireless headset and is becoming popular in the gaming and entertainment industries. "Given the growing popularity of EEG headsets and the variety of ways in which they could be used, it is inevitable that they will become part of our daily lives, including while using other devices," Saxena said. "It is important to analyze the potential security and privacy risks associated with this emerging technology to raise users' awareness of the risks and develop viable solutions to malicious attacks." One potential solution proposed by Saxena and his team is the insertion of noise anytime a user types a password or PIN while wearing an EEG headset.