Optimizing Decision Tree Attack on CAS Scheme

In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS) scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during t...

Full description

Bibliographic Details
Main Authors: PERKOVIC, T., BUGARIC, M., CAGALJ, M.
Format: Article
Language:English
Published: Stefan cel Mare University of Suceava 2016-05-01
Series:Advances in Electrical and Computer Engineering
Subjects:
Online Access:http://dx.doi.org/10.4316/AECE.2016.02010