Attacks on Heartbeat-Based Security Using Remote Photoplethysmography.
Robert Mark SeepersWenjin WangGerard de HaanIoannis SourdisChristos StrydisPublished in: IEEE J. Biomed. Health Informatics (2018)
Keyphrases
- security threats
- security mechanisms
- security problems
- security measures
- java card
- computer security
- countermeasures
- security protocols
- security vulnerabilities
- security breaches
- fault injection
- security issues
- cyber attacks
- chosen plaintext
- security risks
- security flaws
- malicious users
- denial of service attacks
- stream cipher
- information security
- cryptographic protocols
- identity theft
- information leakage
- network security
- intrusion detection
- security requirements
- malicious attacks
- intrusion detection and prevention
- cryptographic algorithms
- secure routing
- security management
- attack scenarios
- operating system
- biometric template
- insider attacks
- anomaly detection
- intrusion prevention
- access control
- buffer overflow
- resource constrained
- security policies
- security properties
- user authentication
- ddos attacks
- cyber security
- key management