91ÇàÇà²Ý

News

Information security researchers need to anticipate the next step of an attacker

In his doctoral studies, Mika Juuti focused on machine learning methods in information security
Mika Juuti studied the use of machine learning in information security for his dissertation.
Mika Juuti studied the use of machine learning in information security for his dissertation. Photo Anu Haapala / Aalto University

Thanks to the modern technology, you can open a car door or smart gate without pressing a button and pay your groceries by simply showing your debit card to a payment terminal. Transparent authentication systems like these are easy to use, but the other side of the coin may be weak information security. Machine learning is one way of improving transparent authentication and this is one of the topics on which Mika Juuti, a doctoral candidate at Aalto University, focused in his .

Transparent authentication systems aim to anticipate user’s aim to access a system. They are based on two physical devices communicating with each other, such as a smart key and a car or a smart gate. When the car or the gate verifies that the user is close by, the door or the gate opens. In keyless cars, for example, this happens by measuring the radio signal sent by the car key.

Manufacturers of many expensive cars have recently suffered from problems related to transparent authentication systems, as the radio signal between the car key and the car’s authentication system is easy to manipulate. In these types of attacks – called relay attacks – the attacker places two relays in the signal between the car and the key that strengthen the connection. Consequently, the door opens even though, in reality, the key was nowhere near the car.

Making use of machine learning in information security was a central theme in Juuti’s dissertation. In the first part of his dissertation, Juuti studied systems that aim to attack transparent authentication systems and how transparent authentication systems can defend themselves against such attacks.

As a part of the research project, Juuti and his colleagues developed an Android-based mobile app STASH that wants to prevent relay attacks. It allows access to a system’s database or its usage only if it can ensure that, for example, the key is close to the smart gate.

The STASH app estimates the proximity based on user's previous trajectories. The system is secure because the attacker cannot manipulate the acceleration or gyro sensors of a key or similar device. STASH could effectively prevent, for example, attacks to smart gates or smart houses. Researchers tested the new app in controlled settings and designed it in a way that allows its integration to existing transparent authentication systems.

Look at the whole picture

Juuti – who will defend his dissertation on Monday, 19th of August – says that it is important for designers and researchers to understand motives and current technology in order to design safer systems.

‘Unlike in many other disciplines, cyber security research studies an attacker who doesn’t tell that they have discovered a new way of attacking because it benefits them economically or in some other way. Therefore, researchers need to anticipate problems that may arise when launching a new technology.’

According to Juuti, focusing on the whole picture and evaluating each component of a system is essential when improving information security. What is the weakest link of the system? What is the worst thing that could happen if an attacker exploits its vulnerabilities? ‘If you go through all these things, you will find many ways in which you can weaken information security properties of a system.’

Researchers need to anticipate problems that may arise when launching a new technology

Mika Juuti

In his dissertation, Juuti presents the most effective state-of-art evasion and model extraction attacks against image classification systems. In addition, he evaluates hate speech classifiers against evasions attacks and presents an AI-based method that creates credible fake restaurant reviews.

‘Adversarial machine learning’, in which a malicious person aims to either evade or steal a machine learning method for their own purposes, develops constantly. Understanding of adversarial machine learning helps to design more secure systems.

Juuti, however, suggests that attackers adapt their behavior in order to evade protection systems. Therefore, maintenance of reliable security systems is complicated and calls for constant work. ‘Often, it is a real cat-and-mouse game,’ says Juuti.

Benefits of a diverse research group

Juuti did his bachelor’s, master’s, and doctoral studies at Aalto University. He has enjoyed researching and testing things since he was a little child, and therefore, researching and assessing things critically are an important part of his identity. During his master's studies, he gained hands-on research experience at the machine learning research group and as an exchange student in Japan, which gave him confidence to apply to doctoral studies.

Juuti’s supervisor was and he worked at Asokan’s . Each year, the group has two or three postdoctoral researchers, five to ten doctoral researchers, and a few master’s and bachelor’s students.

Juuti says that his experience about working at the group was very positive. In a diverse group, discussions are often fruitful, which he found useful. During his doctoral studies, Juuti collaborated also with international universities. Creating good collaboration was challenging but very rewarding. ‘It’s good to make sure that everyone understands things in the same way, because everyone looks at them from their own perspective. In that way, you’ll achieve good results.’

Currently, Juuti works at Huawei in Helsinki but he will move to Canada later this year. ‘I will work as a postdoc at the University of Waterloo, so I will continue working in academia for at least some time.’

Mika Juuti, M.Sc. (Tech.), will defend the dissertation "Access Control and Machine Learning: Evasion and Defenses" at the Aalto University School of Science. In this dissertation, machine learning-reliant access control systems were examined.

  • Updated:
  • Published:
Share
URL copied!

Read more news

A modern room with unique white chairs, wooden stools, leafy plants, and a cloud-like hanging lamp.
Research & Art Published:

Aalto University Furniture Program is exhibiting at 3daysofdesign in Copenhagen

3 Days of Design, the Copenhagen-based festival, is taking place from 18 to 20 June 2025.
Opiskelijoita Korkeakoulunaukiolla
Research & Art Published:

School of Business researchers have shared their expertise in top-tier media outlets

Over the Spring (March-May) of 2025, the School of Business featured in several publications reaching more than 270,000 views from a massive global audience
People wearing black academic robes and blue caps in a ceremony. Some are standing, others clapping from seats.
Research & Art Published:

The Ceremonial Conferment of Degrees in Arts, Design and Architecture was celebrated with joy

A total of 59 masters and 41 doctors were conferred. There were 225 participants in total, and the promotion week was celebrated in a festive and joyful atmosphere.
A man in a suit standing next to a large green metal door in an underground bunker.
Press releases Published:

Doctoral thesis: Finland’s civil defence shelters protect nearly everyone – but hotter summers may test their limits

Built over decades, Finland’s civil defence shelter system covers almost the entire population and has cost the equivalent of three years of defence spending.