Continuous User Authentication on Everyday Devices
This project explored continuous user authentication on personal computing devices.
The Cyber Identity and Behavior Research (CIBeR) Lab primarily uses applied artificial intelligence and human-centered computing techniques to explore:
Currently, we do not have funding for additional Ph.D. students and can only welcome you if you have a fellowship.
Ph.D. students with experience in one or more of the following research areas are encouraged to send their application materials (listed below) to Dr. Neal via e-mail.
Ph.D students must be able and willing to:
Interested Ph.D. students should submit the following materials via e-mail for consideration.
M.S. students seeking a thesis advisor are encouraged to reach out to Dr. Neal no later than the middle of their first semester in the M.S. program.
We are always looking for enthusiastic undergraduate students interested in gaining hands-on experience in research. Ideal students will have some experience in our research areas and will be able to clearly articulate how they want to contribute to the lab. Ideal students will also be able to dedicate 3-5 hours to working with our research team per week, and will meet regularly during lab meetings. All undergraduate students are brought into the lab as volunteers, and are encouraged to take full advantage of the wide spectrum of learning opportunities. Importantly, all undergraduates working with the lab should strongly considering registering for Supervised Research (CIS 4915) credits.
This project explored continuous user authentication on personal computing devices.
Increasing cybersecurity awareness among historically excluded racial/ethnic groups
This research explores behavioral biometric modalities in mobile devices, demonstrating the effectiveness of passive continuous authentication through patterns in application use, Bluetooth and Wi-Fi activity, and communication, with significant findings including improved feature representation, gender-based usage patterns, attack simulations, and novel profiling and ranking techniques.