{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:05:58Z","timestamp":1758823558395,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605764.3623909","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:12:17Z","timestamp":1700568737000},"page":"115-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Dictionary Attack on IMU-based Gait Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7467-5762","authenticated-orcid":false,"given":"Rajesh","family":"Kumar","sequence":"first","affiliation":[{"name":"Bucknell University, LEWISBURG, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2894-4540","authenticated-orcid":false,"given":"Can","family":"Isik","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6149-6930","authenticated-orcid":false,"given":"Chilukuri Krishna","family":"Mohan","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484366"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3206321"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.603331"},{"volume-title":"Trust Management XII, , Nurit Gal-Oz and Peter R","author":"Al-Naffakh Neamah","key":"e_1_3_2_1_4_1","unstructured":"Neamah Al-Naffakh, Nathan Clarke, and Fudong Li. 2018. Continuous User Authentication Using Smartwatch Motion Sensor Data. In Trust Management XII, , Nurit Gal-Oz and Peter R. Lewis (Eds.). Springer International Publishing."},{"key":"e_1_3_2_1_5_1","unstructured":"Samy Bengio Christine Marcel S\u00e9bastien Marcel and Johnny Mari\u00e9thoz. [n. d.]. Confidence measures for multimodal identity verification. Information Fusion ( [n. d.]). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1566253502000891"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/christoph-busch.de\/files\/Busch-EAB-ISO-24745--120713.pdf. Online","author":"Busch Christoph","year":"2019","unstructured":"Christoph Busch. 2012. ISO\/IEC Standard 24745 - Biometric Information Protection. https:\/\/christoph-busch.de\/files\/Busch-EAB-ISO-24745--120713.pdf. Online; accessed October 11, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.01.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"e_1_3_2_1_11_1","volume-title":"Reynolds","author":"Doddington George R.","year":"1998","unstructured":"George R. Doddington, Walter Liggett, Alvin F. Martin, Mark A. Przybocki, and Douglas A. Reynolds. 1998. SHEEP, GOATS, LAMBS and WOLVES: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In ICSLP."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00053"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401905"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51--59"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/415817"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380623"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902030"},{"volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops,","author":"Gafurov Davrondzhon","key":"e_1_3_2_1_19_1","unstructured":"Davrondzhon Gafurov, Einar Snekkenes, and Tor Erik Buvarp. 2006 b. Robustness of Biometric Gait Authentication Against Impersonation Attack. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, , Robert Meersman, Zahir Tari, and Pilar Herrero (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668024.2668027"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.03.011"},{"volume-title":"2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP). 205--210","author":"Hestbek M. R.","key":"e_1_3_2_1_22_1","unstructured":"M. R. Hestbek, C. Nickel, and C. Busch. 2012. Biometric gait recognition for mobile devices using wavelet transform and support vector machines. In 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP). 205--210."},{"volume-title":"Department of Computer Science and Media Technology","author":"Holien Kjetil","key":"e_1_3_2_1_23_1","unstructured":"Kjetil Holien. 2008. Gait recognition under non-standard circumstances. In Department of Computer Science and Media Technology, Gj\u00f8vik University College."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358794"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374552"},{"key":"e_1_3_2_1_27_1","volume-title":"Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication. ACM Journal of Digital Threats: Research and Practice","author":"Kumar Rajesh","year":"2021","unstructured":"Rajesh Kumar, Can Isik, and VV Phoha. 2021. Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication. ACM Journal of Digital Threats: Research and Practice (2021)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2018.8311467"},{"key":"e_1_3_2_1_29_1","unstructured":"R. Kumar VV. Phoha and R. Raina. 2016. Authenticating users through their arm movement patterns. CoRR Vol. abs\/1603.02211 (2016). http:\/\/arxiv.org\/abs\/1603.02211"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"R. Kumar V. V. Phoha and A. Jain. 2015. Treadmill attack on gait-based authentication systems. In 2015 IEEE (BTAS-2015). 1--8. https:\/\/doi.org\/10.1109\/BTAS.2015.7358801","DOI":"10.1109\/BTAS.2015.7358801"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"J.R. Kwapisz G.M. Weiss and S.A. Moore. 2010. Cell phone-based biometric identification. In IEEE-BTAS. 1--7. https:\/\/doi.org\/10.1109\/BTAS.2010.5634532","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"e_1_3_2_1_32_1","volume-title":"Lee","author":"Lee Wei-Han","year":"2017","unstructured":"Wei-Han Lee and Ruby B. Lee. 2017. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. CoRR , Vol. abs\/1708.09754 (2017). arxiv: 1708.09754 http:\/\/arxiv.org\/abs\/1708.09754"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340293"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.2"},{"key":"e_1_3_2_1_36_1","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security","author":"Mjaaland B.","unstructured":"BendikB. Mjaaland, Patrick Bours, and Danilo Gligoroski. 2010. Walk the Walk: Attacking Gait Biometrics by Imitation. In Information Security. Lecture Notes in Computer Science, Vol. 6531. Springer Berlin Heidelberg, 361--380."},{"key":"e_1_3_2_1_37_1","volume-title":"Open. In 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems. \"https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/bitstream\/handle\/11250\/261802\/347750_FULLTEXT01","author":"Mjaaland Bendik B.","year":"2009","unstructured":"Bendik B. Mjaaland. 2009. NNTU, Open. In 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems. \"https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/bitstream\/handle\/11250\/261802\/347750_FULLTEXT01.pdf\""},{"key":"e_1_3_2_1_38_1","volume-title":"The Plateau: Imitation Attack Resistance of Gait Biometrics. In Policies and Research in Identity Management, Elisabeth de Leeuw, Simone Fischer-H\u00fcbner","author":"Mjaaland Bendik B.","year":"2010","unstructured":"Bendik B. Mjaaland. 2010. The Plateau: Imitation Attack Resistance of Gait Biometrics. In Policies and Research in Identity Management, Elisabeth de Leeuw, Simone Fischer-H\u00fcbner, and Lothar Fritsch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 100--112."},{"key":"e_1_3_2_1_39_1","unstructured":"Jun Hyung Mo and Rajesh Kumar. 2022. iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems. arxiv: 2210.00615 [cs.CR]"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684152"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.6256346"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"K. Nandakumar and A. K. Jain. 2015. Biometric Template Protection: Bridging the performance gap between theory and practice. IEEE Signal Processing Magazine (Sep. 2015).","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_3_2_1_44_1","volume-title":"BIOSIG 2011 -- Proceedings of the Biometrics Special Interest Group, , Arslan Br\u00f6mme and Christoph Busch (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 57--66","author":"Nickel Claudia","year":"2011","unstructured":"Claudia Nickel, Holger Brandt, and Christoph Busch. 2011a. Classification of acceleration data for biometric gait recognition on mobile devices. In BIOSIG 2011 -- Proceedings of the Biometrics Special Interest Group, , Arslan Br\u00f6mme and Christoph Busch (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 57--66."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA.2011.5759842"},{"key":"e_1_3_2_1_46_1","volume-title":"Strength of Function for Authenticators - Biometrics (SOFA-B). https:\/\/www.nist.gov\/system\/files\/documents\/2020\/07\/30\/08_newton_biometrics_presentation_final.pdf. Online","author":"National Institute of Standards and Technology. 2016.","year":"2020","unstructured":"National Institute of Standards and Technology. 2016. Strength of Function for Authenticators - Biometrics (SOFA-B). https:\/\/www.nist.gov\/system\/files\/documents\/2020\/07\/30\/08_newton_biometrics_presentation_final.pdf. Online; accessed February 8, 2020."},{"key":"e_1_3_2_1_47_1","volume-title":"Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Primo Abena","year":"2014","unstructured":"Abena Primo, Vir V. Phoha, Rajesh Kumar, and Abdul Serwadda. 2014. Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"volume-title":"People Identification Using Gait Via Floor Pressure Sensing and Analysis","author":"Qian Gang","key":"e_1_3_2_1_48_1","unstructured":"Gang Qian, Jiqing Zhang, and Assegid Kidan\u00e9. 2008. People Identification Using Gait Via Floor Pressure Sensing and Analysis. Springer Berlin Heidelberg, Berlin, Heidelberg."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2244091"},{"volume-title":"An Analysis of Minutiae Matching Strength. In AVBPA '01","author":"Ratha Nalini K.","key":"e_1_3_2_1_50_1","unstructured":"Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. An Analysis of Minutiae Matching Strength. In AVBPA '01."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/310930.310988"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516960"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516659"},{"key":"e_1_3_2_1_55_1","volume-title":"Toward Robotic Robbery on the Touch-Screen. ACM-TISSEC","author":"Serwadda Abdul","year":"2016","unstructured":"Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, and Shukla Diksha. 2016. Toward Robotic Robbery on the Touch-Screen. ACM-TISSEC (2016)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949032"},{"volume-title":"Body-Taps: Authenticating Your Device Through Few Simple Taps. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). 1--8.","author":"Shukla D.","key":"e_1_3_2_1_57_1","unstructured":"D. Shukla, G. Wei, D. Xue, Z. Jin, and V. V. Phoha. 2018. Body-Taps: Authenticating Your Device Through Few Simple Taps. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). 1--8."},{"key":"e_1_3_2_1_58_1","volume-title":"Master's Thesis","author":"Stang \u00d8yvind","year":"2007","unstructured":"\u00d8yvind Stang. 2007. Gait analysis: Is it easy to learn to walk like someone else?, Master's Thesis. Gj\u00d8vik University College- Department of Computer Science and Media Technology (2007)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2015.7126347"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS.2012.6466615"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230633"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351273"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.03.011"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.291"},{"key":"e_1_3_2_1_66_1","volume-title":"US20160192863A1.","author":"BAE Systems Information Yu Zhong and Electronic Systems Integration Inc.","year":"2015","unstructured":"BAE Systems Information Yu Zhong and Electronic Systems Integration Inc. 2015. Method for sensor orientation invariant gait analysis using gyroscopes. In United States Patents, US20160192863A1."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996246"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358784"},{"key":"e_1_3_2_1_69_1","volume-title":"Mohamed.","author":"Zi Benjamin","year":"2020","unstructured":"Benjamin Zi, Hao Zhao, Jameel Asghar Hasan, and Ali Kaafar, Mohamed. 2020. On the Resilience of Biometric Authentication Systems against Random Inputs. In NDSS."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150922089"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605764.3623909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:36:53Z","timestamp":1755913013000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":70,"alternative-id":["10.1145\/3605764.3623909","10.1145\/3605764"],"URL":"https:\/\/doi.org\/10.1145\/3605764.3623909","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}