BGK 596E Seminars

CRN 23829

  4  
Title BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System
Speaker Ahmet Furkan Inal
Date May 30th, 2025
Time 10:30 (GMT+3)
Microsoft Teams Meeting ID:
*** *** *** **
Passcode:
******
(Please, contact the secretary's office.)
Abstract
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user’s keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).
  3  
Title FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Speaker Muhammed Güneş
Date May 23rd, 2025
Time 10:30 (GMT+3)
Microsoft Teams Meeting ID:
*** *** *** **
Passcode:
******
(Please, contact the secretary's office.)
Abstract
Unlike signatures in a single-party setting, threshold signatures require cooperation among a threshold number of signers each holding a share of a common private key. Consequently, generating signatures in a threshold setting imposes overhead due to network rounds among signers, proving costly when secret shares are stored on network-limited devices or when coordination occurs over unreliable networks. In this work, we present FROST, a Flexible Round-Optimized Schnorr Threshold signature scheme that reduces network overhead during signing operations while employing a novel technique to protect against forgery attacks applicable to similar schemes in the literature. FROST improves upon the state of the art in Schnorr threshold signature protocols, as it can safely perform signing operations in a single round without limiting concurrency of signing operations, yet allows for true threshold signing, as only a threshold tout of npossible participants are required for signing operations, such that t≤n. FROST can be used as either a two-round protocol, or optimized to a single-round signing protocol with a pre-processing stage. FROST achieves its efficiency improvements in part by allowing the protocol to abort in the presence of a misbehaving participant (who is then identified and excluded from future operations)—a reasonable model for practical deployment scenarios. We present proofs of security demonstrating that FROST is secure against chosen-message attacks assuming the discrete logarithm.
  2  
Title FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System
Speaker İrem Yılmaz
Date May 16th, 2025
Time 10:30 (GMT+3)
Microsoft Teams Meeting ID:
*** *** *** **
Passcode:
******
(Please, contact the secretary's office.)
Abstract
This paper presents FedML-HE, a practical federated learning system that integrates homomorphic encryption (HE) to protect user privacy during model aggregation. By selectively encrypting sensitive model parameters, FedML-HE significantly reduces computational and communication overhead. It demonstrates strong scalability, achieving up to 10x and 40x efficiency gains for ResNet-50 and BERT models, respectively.
  1  
Title Exploring Web3 From the View of Blockchain
Speaker Nadir Alishli
Date April 18th, 2025
Time 10:30 (GMT+3)
Microsoft Teams Meeting ID:
*** *** *** **
Passcode:
******
(Please, contact the secretary's office.)
Abstract
Web3 is the most hyped concept from 2020 to date, greatly motivating the prosperity of the Internet of Value and Metaverse. However, no solid evidence stipulates the exact definition, criterion, or standard in the sense of such a buzzword. To fill the gap, we aim to clarify the term in this work. We narrow down the connotation of Web3 by separating it from high-level controversy argues and, instead, focusing on its protocol, architecture, and evaluation from the perspective of blockchain fields. Specifically, we have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method. The evaluation shows that existing applications are neither secure nor adoptable as claimed. Meanwhile, we also discuss opportunities and challenges surrounding the Web3 space and answer several prevailing questions from communities. A primary result is that Web3 still relies on traditional internet infrastructure, not as independent as advocated. This report, as of June 2022, provides the first strict research on Web3 in the view of blockchain. We hope that this work would provide a guide for the development of future Web3 services.