Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Information Security

Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol Jun 2023

Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep …


Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson Jun 2023

Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.


Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden Mar 2023

Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper will discuss two versions of probabilistic context-free grammar password-guessing models. The first model focuses on using English semantics to break down passwords and identify patterns. The second model identifies repeating chunks in passwords and uses this information to create possible passwords. Then, we will show the performance of each model on leaked password databases, and finally discuss the observations made on these tests.


Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist Jul 2022

Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The Internet of Things has increased in popularity in recent years, with daily life now being surrounded by “smart devices.” This network of smart devices, such as thermostats, refrigerators, and even stationary bikes affords us convenience, but at a cost. Security measures are typically inferior on these devices; considering that they collect our data around the clock, this is a big reason for concern. Recent research shows that blockchain technology may be one way to address these security concerns. This paper discusses the Internet of Things and the current issues with how security is handled, discusses how blockchain can shore …


Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson Mar 2022

Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The main highway of communication in a vehicle is the Controller Area Network, commonly known by the acronym CAN. Any vulnerability in this network could allow bad actors to block communication between vehicle subsystems, risking the safety of the vehicle’s occupants. With the ever growing list of vulnerabilities being exposed in the CAN, it is critical to address its safety. This paper looks at one of the known vulnerabilities in the data link layer of the CAN and an Intrusion Detection System that could detect attacks on this network. We detail a few processes of the CAN, arbitration and error …


Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein Aug 2021

Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Browser fingerprinting is a type of internet tracking where the attributes of a user’s computer and browser accessing a web page are remotely recorded and then used for profiling, tracking, and advertising purposes. This paper focuses on defining browser fingerprinting and enumerating ways in which the user can combat fingerprinting. Browser fingerprinting can be thwarted by changing attributes within the user’s browser or machine, using a browser designed to combat fingerprinting, or with security and anti-fingerprinting focused browser extensions. All of these methods are capable of increasing the security of the user.