About
65
Publications
32,255
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
515
Citations
Introduction
Sandeep Gupta currently works at the Department of Information Engineering and Computer Science, Università degli Studi di Trento. He has wide experience in creating product vision and technology roadmaps for cybersecurity applications. He possesses knowledge and experience to drive products from their incubation to next-generation iteration.
https://www.linkedin.com/in/sandeepgupta26/
https://www.youtube.com/channel/UCysLU5CbsX-_tD5MNp-CFqg/
Current institution
Additional affiliations
November 2012 - August 2016
Samsung R & D
Position
- Manager
Description
- SAMSUNG Certified Architect (SWAP) the highest technical capability at Samsung ORCs worldwide. Among the top 0.05% Technical Leaders. MagicInfo – Express Author product-line.
January 2011 - November 2012
Education
August 2010 - April 2020
University of Trento
Field of study
- Cyber Security
Publications
Publications (65)
Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the li...
This paper presents a bimodal scheme-the mechanism which exploits the way the user enters her 8-digit PIN/password and the phone-movements while doing so, for user authentication in mobile banking/financial applications (apps). The scheme authenticates the user based on the timing differences of the entered strokes. Additionally, it provides an enh...
An electronic device, a method of an electronic device authenticating a user and a computer readable recording medium are provided, The electronic device includes a storage configured to store an identifier and attributes of a first object as authentication information, a display configured to display a plurality of authentication objects comprisin...
Functional verification (namely early verification of multimedia processing capabilities) is one of the main challenges in developing SoC-based products, such as consumer electronic devices and portables that incorporate complex audio and video interfaces. Due to rising design complexity, increasingly intricate hardware/software interactions and ri...
Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid proliferation of deployed devices and escalating cyberattacks. Consequently, cybersecurity measures with an improved generalisation that can proactively determine the indicators of compromises to predict 0‐day threats or previously unseen malware togeth...
Deep learning has unequivocally emerged as the backbone of simple to highly sensitive systems demanding artificial intelligence across diverse domains. For instance, foundation models based on deep neural networks (DNNs) can play a crucial role in the design of security-sensitive systems, such as facial recognition systems (FRS). Despite achieving...
p>Demand for autonomous protection in computing devices can not go unnoticed with a cataclysmic rise in cyber-attacks. Consequently, cybersecurity measures with an improved generalization that can proactively determine the indicators of compromises to predict zero-day threats or previously unseen malware together with known malware are highly desir...
p>Demand for autonomous protection in computing devices can not go unnoticed with a cataclysmic rise in cyber-attacks. Consequently, cybersecurity measures with an improved generalization that can proactively determine the indicators of compromises to predict zero-day threats or previously unseen malware together with known malware are highly desir...
p>Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations for transportation can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. However, given the complexity involved in the deployment of CAVs, zero-t...
p>Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations for transportation can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. However, given the complexity involved in the deployment of CAVs, zero-t...
p>Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations for transportation can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. However, given the complexity involved in the deployment of CAVs, zero-t...
A number of research in Information and Communication Technology (ICT) have shown that usability is an important goal for software-based interactive systems and products for a wider acceptance by their end-users. To evaluate the usability of a system under design, usability evaluation methods predominantly rely on subject matter experts or testers'...
Demand for autonomous protection in computing devices can not go unnoticed with an enormous increase in cyber attacks. Consequently, cybersecurity measures to continuously monitor and analyze device critical activity, identify suspicious behavior, and proactively mitigate security risks are highly desirable. In this article, a concept of behavioral...
https://www.techrxiv.org/articles/preprint/A_Survey_of_Security_Mechanisms_for_Edge_Computing_based_Connected_Autonomous_Vehicles/20115317
Edge Computing-based Connected Autonomous Vehicles (EC-CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations to transportation ecosystems can bring manyfold benefits...
p>Edge Computing-based Connected Autonomous Vehicles (EC-CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations to transportation ecosystems can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. Given the complexity involved in the deplo...
Secure and efficient communication to establish a seamless nexus between the five levels of a typical automation pyramid is paramount to Industry 4.0. Specific ally, vertical and horizontal integration of these levels is an overarching requirement to accelerate productivity and improve operational activities. Vertical
integration can improve visibi...
Usable Identity and Access Management (IAM) schemes are highly required to control and track users’ identity and access privileges for a safe and secure smart city. Any safety or security breach in critical infrastructures, e.g., smart financial solutions, smart transportation, and smart buildings, can disrupt the normal life of its residents. Stud...
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations for transportation can bring manyfold benefits, from fully autonomous driving services to proactive vehicle monitoring and traffic management. However, given the complexity involved in the deployment of CAVs, zero-to...
In Industry 4.0 (I4.0), reliable data sharing between multiple entities is profoundly significant for both the business-level and the manufacturing operations-level collaboration. Eventually , machine-to-machine (M2M) communication technology can be a key underlying technology for I4.0, where devices (e.g., sensors, actuators, and gateways) can exc...
In Industry 4.0 (I4.0), reliable data sharing between multiple entities is profoundly significant for both the business-level and the manufacturing operations-level collaboration. Eventually, machine-to-machine (M2M) communication technology can be a key underlying technology for I4.0, where devices (e.g., sensors, actuators, and gateways) can exch...
Driverless taxis are now closer to their worldwide launch, however, unsupervised physical access to the riders can pose unexpected safety and security risks to the connected and autonomous vehicle’s ecosystems. Thus, the need for human-to-machine authentication in driverless settings cannot be disregarded to maintain their smooth operations. In thi...
Usable Identity and Access Management (IAM) schemes are highly required to control and track users' identity and access privileges for a safe and secure smart city. Any safety or security breach in critical infrastructures, e.g., smart financial solutions, smart transportation, and smart buildings, can disrupt the normal life of its residents. Stud...
p>The proliferation of the Internet of Things (IoT) devices and advances in their computing capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate localize computing and data storage. As a result, limitations like network connectivity issues, data mobility constraints, and real-time processing delays, in Cloud computin...
p>The proliferation of the Internet of Things (IoT) devices and advances in their computing capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate localize computing and data storage. As a result, limitations like network connectivity issues, data mobility constraints, and real-time processing delays, in Cloud computin...
p>Wireless internet are among the fastest-growing segment of the communication industry. It is absolutely necessitated for future wireless internet to reach all terrestrial and aerial spaces covering densely populated areas to entire geographical regions across the globe to bring the cyber and the physical world further closer. The International Te...
p>Wireless internet are among the fastest-growing segment of the communication industry. It is absolutely necessitated for future wireless internet to reach all terrestrial and aerial spaces covering densely populated areas to entire geographical regions across the globe to bring the cyber and the physical world further closer. The International Te...
Edge Computing-based Connected Autonomous Vehicles (EC-CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations to transportation ecosystems can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. Given the complexity involved in the deploym...
p>The proliferation of Internet of Things (IoT) systems is having a profound impact across all aspects of life. Recognising and identifying particular users is central to delivering the personalised experience that citizens want to experience, and that organisations wish to deliver. This article presents a survey of human-computer interaction-based...
p>Edge Computing-based Connected Autonomous Vehicles (EC-CAVs) can fulfill the emerging demand for smart transportation on a global scale. Such innovations to transportation ecosystems can bring manyfold benefits from fully autonomous driving services to proactive vehicle monitoring and traffic management. Given the complexity involved in the deplo...
p>The proliferation of Internet of Things (IoT) systems is having a profound impact across all aspects of life. Recognising and identifying particular users is central to delivering the personalised experience that citizens want to experience, and that organisations wish to deliver. This article presents a survey of human-computer interaction-based...
p>A number of research in Information and Communication Technology (ICT) have shown that usability is an important goal for software-based interactive systems and products for a wider acceptance by their end-users. To evaluate the usability of a system under design, usability evaluation methods predominantly rely on subject matter experts or tester...
Step & Turn is a novel bimodal behavioral biometric-based verification scheme for physical access control. In today's rapidly evolving smart physical spaces, frictionless and smooth interactions are emerging as critical usability requirements. Such demands need to coexist with mandatory requirements like security. Step & Turn addresses the fundamen...
Step & Turn is a novel bimodal behavioral biometric-based verification scheme for physical access control. In today’s rapidly evolving smart physical spaces, frictionless and smooth interactions are emerging as critical usability requirements. Such demands need to coexist with mandatory requirements like security. Step & Turn addresses the fundamen...
Many studies have shown that single entry-point authentication schemes for smartphones can easily be circumvented. IDeAuth is an implicit deauthentication scheme that aims to minimize unauthorized access to security-sensitive applications and services running on users' smartphones when unauthorized access or intrusions are detected. IDeAuth verifie...
Many studies have shown that single entry-point authentication schemes for smartphones can easily be circumvented. IDeAuth is an implicit deauthentication scheme that aims to minimize unauthorized access to security-sensitive applications and services running on users' smartphones when unauthorized access or intrusions are detected. IDeAuth verifie...
The proliferation of the Internet of Things (IoT) devices and advances in their computing capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate localize computing and data storage. As a result, limitations like network connectivity issues, data mobility constraints, and real-time processing delays, in Cloud computing...
Billions of people have embraced numerous smart apps (applications) for browsing, chatting, emailing, entertainment, fitness, navigation, shopping, social-networking, transportation, and many other activities, with a notion to make their day-to-day life easy and better. Smart apps like TikTok, Uber, Facebook, Google Maps, etc., simply direct users...
Billions of people have embraced numerous smart apps (applications) for browsing, chatting, emailing, entertainment, fitness, navigation, shopping, social-networking, transportation, and many other activities, with a notion to make their day-today life easy and better. Smart apps like TikTok, Uber, Facebook, Google Maps, etc., simply direct users t...
The paper presents a risk-driven behavioral biometric-based user authentication scheme for smartphones. Our scheme delivers one-shot-cum-continuous authentication, thus not only authenticates users at the start of the application sign-in process but also, throughout the active user session. The scheme leverages the widely used PIN/password-based au...
The paper presents a risk-driven behavioral biometric-based user authenti-cation scheme for smartphones. Our scheme delivers one-shot-cum-continuous authenti-cation, thus not only authenticates users at the start of the application sign-in process but also, throughout the active user session. The scheme leverages the widely used PIN/password-based...
The unprecedented rise of IoT has revolutionized every business vertical enthralling people to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is absolutely fair to say that a day without connected IoT systems, such as smart devices, smart enterprises, smart homes or offices, etc., would hamper our convenience...
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems
This is publically available at:
https://www.sciencedirect.com/science/article/pii/S235234091931279X
Download: Download zip file (8MB)
Human errors exploitation could entail unfavorable consequences to smart device users. Typically, smart devices provide multiple configurable features, e.g., user authentication settings, network selection, application installation, communication interfaces, etc., which users can configure according to their need and convenience. However, untrustwo...
Human error exploitation could entail unfavorable consequences to smart device users. Typically, smart devices provide multiple configurable features, e.g., user authentication settings, network selection, application installation, communication interfaces, etc., which users can configure according to their needs and convenience. However, un-trustw...
We present a chimerical dataset that combines both physiological and behavioral biometric traits, for reliable user authentication on smart devices and ecosystems [1]. The data are composed of statistical features computed from swipe-gesture, voice-prints, and face-images. The swipe and voice-prints data presented hereinafter are collected using a...
Driverless vehicles exploit Artificial Intelligence (AI) to offer rides to their users with minimal or no human input. Driverless vehicles as taxis are indeed evolving an entirely new transportation concept, Transportation-As-A-Service (TAAS), steered by well proven client-server infrastructures. Typically, the servers, managed by multinational com...
Over recent years, smart locks have evolved as cyber-physical devices that can be operated by digital keypads, physiological biometrics sensors, smart-card readers, or mobile devices pairing, to secure door access. However, the underlying authentication schemes, i.e., knowledge-based (e.g., PIN/passwords), possession-based (e.g., smartphones, smart...
Over recent years, smart locks have evolved as cyber-physical devices that can be operated by digital keypads, physiological biomet-rics sensors, smart-card readers, or mobile devices pairing, to secure door access. However, the underlying authentication schemes, i.e., knowledge-based (e.g., PIN/passwords), possession-based (e.g., smartphones, smar...
On-demand ride and ride-sharing services have revolutionized the point-to-point transportation market and they are rapidly gaining acceptance among customers worldwide. Alone, Uber and Lyft are providing over 11 million rides per day [1, 2]. These services are provided using a client-server infrastructure. The client is a smartphone-based applicati...
In this paper, we present a novel motion-based behavioral biometric-based user authentication solution - SnapAuth, for Android-based smartwatch. SnapAuth requires the user to perform finger-snapping (Snapping (or clicking) one’s fingers is the act of creating a snapping or clicking sound with one’s fingers. Primarily this is done by building tensio...
In this paper, we present a novel motion-based unobtrusive behavioral biometric-based user authentication solution-SnapAuth, for Android-based smartwatch. SnapAuth requires the user to perform finger-snapping 5 action, while wearing the smartwatch (in the gesture performing arm), to perform the authentication. SnapAuth profiles the arm-movements by...
There are scientific terminologies that were originated from Sanskrit language and are adopted by languages of the recent time. The origin of those English scientific terms in most cases leads to Latin or Greek. However, those words in Latin, Greek or other languages were derived from Sanskrit. The spelling of words gets evolved over the period, bu...
This paper introduces DIALERAUTH - a mechanism which leverages the way a smartphone user taps/enters any text-independent 10-digit number (replicating the dialing process) and the hand's micro-movements she makes while doing so. DIALERAUTH authenticates the user on the basis of timing differences in the entered 10-digit strokes. DIALERAUTH provides...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use, i.e., calling and texting, they have also been used to perform multiple security-sensitive activities, such as online banking and shopping, social networking, taking pictures and emailing. On a positive side, smartphones have improved the quality of...
On-demand ride services and the rideshare infrastructure primarily focus on the minimization of travel time and cost. However, the safety of riders is overlooked by service providers. For driver authentication, existing identity management methods typically check the driving license, which can be easily stolen, forged, or misused. Further, backgrou...
This paper presents a bimodal scheme-the mechanism which exploits the way the user enters her 8-digit PIN/password and the phone-movements while doing so, for user authentication in mobile banking/financial applications (apps). The scheme authenticates the user based on the timing differences of the entered strokes. Additionally, it provides an enh...
I. Abstract Retailers need to respond to the needs of consumers in a fast-moving industry that never stops. This creates real business challenges. For example, retailers must commit to a huge innovation effort, new business models and process change to focus on developing customer centricity-giving customers the feeling they are unique. At the same...
For simple applications, it's enough just to rely on automatic memory management through local variables. But once the data become larger, it is imperative to request memory from the heap and manage. Often, applications that are free from memory leaks but frequently allocate and de-allocate dynamic memory show gradual performance degradation in per...
In the shared memory multi-processor/multi-core architectures, such as SMPs, threads are used to implement parallelism. Earlier, hardware vendors have implemented their own proprietary versions of threads, causing portability a concern for software developers. For many Unix-like POSIX-conformant operating systems such as FreeBSD, NetBSD, OpenBSD, G...
Gathering comprehensive runtime traces is often useful in analyzing the source code thus early debugging. This paper discusses runtime trace generating method for the C++ software applications. Introduction Generating and analyzing runtime traces for large scale enterprise applications is a common task to investigate the cause of arising malfunctio...
Questions
Question (1)
Applications like online-banking or online-shopping cater services to multiple users. Suppose each user can access these applications by login with their unique ID followed by providing their biometric-based signature (e.g., face, fingerprint, voice, swipe gesture, etc.).
- Which classification model, i.e., one-class or multi-class will be more justified for such systems.
- If one constructed a multi-class authentication model, then how to handle the situation to add a new user. Do a model required to be reconstructed every time?
- As the users data is already labeled so why not the one-class authentication model more suitable option? Simply, a labeled input query can be verified with the template stored for that label only.