柠檬导航

News

Information security researchers need to anticipate the next step of an attacker

In his doctoral studies, Mika Juuti focused on machine learning methods in information security
Mika Juuti studied the use of machine learning in information security for his dissertation.
Mika Juuti studied the use of machine learning in information security for his dissertation. Photo Anu Haapala / Aalto University

Thanks to the modern technology, you can open a car door or smart gate without pressing a button and pay your groceries by simply showing your debit card to a payment terminal. Transparent authentication systems like these are easy to use, but the other side of the coin may be weak information security. Machine learning is one way of improving transparent authentication and this is one of the topics on which Mika Juuti, a doctoral candidate at Aalto University, focused in his .

Transparent authentication systems aim to anticipate user鈥檚 aim to access a system. They are based on two physical devices communicating with each other, such as a smart key and a car or a smart gate. When the car or the gate verifies that the user is close by, the door or the gate opens. In keyless cars, for example, this happens by measuring the radio signal sent by the car key.

Manufacturers of many expensive cars have recently suffered from problems related to transparent authentication systems, as the radio signal between the car key and the car鈥檚 authentication system is easy to manipulate. In these types of attacks 鈥 called relay attacks 鈥 the attacker places two relays in the signal between the car and the key that strengthen the connection. Consequently, the door opens even though, in reality, the key was nowhere near the car.

Making use of machine learning in information security was a central theme in Juuti鈥檚 dissertation. In the first part of his dissertation, Juuti studied systems that aim to attack transparent authentication systems and how transparent authentication systems can defend themselves against such attacks.

As a part of the research project, Juuti and his colleagues developed an Android-based mobile app STASH that wants to prevent relay attacks. It allows access to a system鈥檚 database or its usage only if it can ensure that, for example, the key is close to the smart gate.

The STASH app estimates the proximity based on user's previous trajectories. The system is secure because the attacker cannot manipulate the acceleration or gyro sensors of a key or similar device. STASH could effectively prevent, for example, attacks to smart gates or smart houses. Researchers tested the new app in controlled settings and designed it in a way that allows its integration to existing transparent authentication systems.

Look at the whole picture

Juuti 鈥 who will defend his dissertation on Monday, 19th of August 鈥 says that it is important for designers and researchers to understand motives and current technology in order to design safer systems.

鈥楿nlike in many other disciplines, cyber security research studies an attacker who doesn鈥檛 tell that they have discovered a new way of attacking because it benefits them economically or in some other way. Therefore, researchers need to anticipate problems that may arise when launching a new technology.鈥

According to Juuti, focusing on the whole picture and evaluating each component of a system is essential when improving information security. What is the weakest link of the system? What is the worst thing that could happen if an attacker exploits its vulnerabilities? 鈥業f you go through all these things, you will find many ways in which you can weaken information security properties of a system.鈥

Researchers need to anticipate problems that may arise when launching a new technology

Mika Juuti

In his dissertation, Juuti presents the most effective state-of-art evasion and model extraction attacks against image classification systems. In addition, he evaluates hate speech classifiers against evasions attacks and presents an AI-based method that creates credible fake restaurant reviews.

鈥楢dversarial machine learning鈥, in which a malicious person aims to either evade or steal a machine learning method for their own purposes, develops constantly. Understanding of adversarial machine learning helps to design more secure systems.

Juuti, however, suggests that attackers adapt their behavior in order to evade protection systems. Therefore, maintenance of reliable security systems is complicated and calls for constant work. 鈥極ften, it is a real cat-and-mouse game,鈥 says Juuti.

Benefits of a diverse research group

Juuti did his bachelor鈥檚, master鈥檚, and doctoral studies at Aalto University. He has enjoyed researching and testing things since he was a little child, and therefore, researching and assessing things critically are an important part of his identity. During his master's studies, he gained hands-on research experience at the machine learning research group and as an exchange student in Japan, which gave him confidence to apply to doctoral studies.

Juuti鈥檚 supervisor was and he worked at Asokan鈥檚 . Each year, the group has two or three postdoctoral researchers, five to ten doctoral researchers, and a few master鈥檚 and bachelor鈥檚 students.

Juuti says that his experience about working at the group was very positive. In a diverse group, discussions are often fruitful, which he found useful. During his doctoral studies, Juuti collaborated also with international universities. Creating good collaboration was challenging but very rewarding. 鈥業t鈥檚 good to make sure that everyone understands things in the same way, because everyone looks at them from their own perspective. In that way, you鈥檒l achieve good results.鈥

Currently, Juuti works at Huawei in Helsinki but he will move to Canada later this year. 鈥業 will work as a postdoc at the University of Waterloo, so I will continue working in academia for at least some time.鈥

Mika Juuti, M.Sc. (Tech.), will defend the dissertation "Access Control and Machine Learning: Evasion and Defenses" at the Aalto University School of Science. In this dissertation, machine learning-reliant access control systems were examined.

  • Updated:
  • Published:
Share
URL copied!

Read more news

A person in black touches a large stone sculpture outside a brick building under a blue sky.
Campus, Research & Art, University Published:

Glitch artwork challenges to see art in a different light

Laura K枚n枚nen's sculpture was unveiled on 14 October at the Otaniemi campus.
Book cover of 'Nanoparticles Integrated Functional Textiles' edited by Md. Reazuddin Repon, Daiva Miku膷ioniene, and Aminoddin Haji.
Research & Art Published:

Nanoparticles in Functional Textiles

Dr. Md. Reazuddin Repon, Postdoctoral Researcher at the Textile Chemistry Group, Department of Bioproducts and Biosystems, Aalto University, has contributed as an editor to a newly published academic volume titled 鈥淣anoparticles Integrated Functional Textiles鈥.
A modern building with a colourful tiled facade with solar panels. The sky is clear and light blue.
Press releases, Research & Art Published:

Carbon-based radicals at the frontier of solar cell technology

Could a single unpaired electron change the future of solar energy?
A crowd gathered in a modern building with large windows and wooden accents, watching a speaker on stage.
Research & Art, University Published:

Connecting the creative community 鈥 Aalto ARTS launches newsletter and LinkedIn page

The School of Arts, Design and Architecture has launched a new Friends of Aalto ARTS newsletter and opened its own LinkedIn page.