{"id":37,"date":"2014-05-30T23:37:57","date_gmt":"2014-05-30T23:37:57","guid":{"rendered":"http:\/\/uwbiorobotics.wordpress.com\/?page_id=37"},"modified":"2014-05-30T23:37:57","modified_gmt":"2014-05-30T23:37:57","slug":"bci-security","status":"publish","type":"page","link":"https:\/\/wp.ece.uw.edu\/brl\/neural-engineering\/bci-security\/","title":{"rendered":"BCI Security"},"content":{"rendered":"<h3>The problem<\/h3>\n<p>Brain-computer interfaces (BCIs) represent a direct communication link between the brain and an external device. Recent experimental results show how electroencephalographic (EEG) signals, recorded from consumer-grade BCI devices, can be used to extract private information about a user. With sufficient computational power, this information can be exploited by others to make inferences about our memory, intentions, conscious and unconscious interests, as well as about our emotional reactions. Privacy and security issues arising from the misuse of BCI devices is an important issue that deserves immediate attention and careful consideration.<\/p>\n<p><a href=\"https:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/05\/Privacy_threats_4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-516\" src=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/Privacy_threats_4.jpg\" alt=\"Privacy_threats_4\" width=\"600\" height=\"316\" srcset=\"https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/Privacy_threats_4.jpg 1509w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/Privacy_threats_4-300x158.jpg 300w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/Privacy_threats_4-1024x539.jpg 1024w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/Privacy_threats_4-768x405.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h3>Our solution<\/h3>\n<p>This project focuses on making improvements to privacy and security properties of BCI-enabled technologies. In doing so, the project consists of two major steps. The focus of the \ufb01rst step is to <em>identify <\/em>which components of an electroencephalography (EEG) signal can be used to extract private information. After identifying potential vulnerabilities, we will <em>quantify<\/em> the amount of exposed information. Based on the obtained results, the focus of the second step is the development of a software tool, aimed at <em>preventing potential extraction <\/em>of users\u2019 private information. The proposed tool, which we refer to as the \u201cBCI Anonymizer\u201d, is based on our hypothesis that recorded brain signals can be decomposed into a collection of characteristic signal components in real time. From these components, one can extract information corresponding to a user\u2019s intended BCI commands, while filtering out any potentially private information.<\/p>\n<h3>Impact<\/h3>\n<p>The aims of this project are expected to enhance the development of the closed-loop brain-controlled interfaces. The knowledge of how to extract private information from the recorded brain signals, and more importantly, how to decompose recorded signals to prevent the potential private information leakage, will advance the ability to select useful control commands from the brain in real time. Moreover, as more BCIs start involving wireless communication, this project will provide enabling technology for addressing the emerging security and privacy issues.<\/p>\n<p><em>Affiliated Students and Faculty<\/em>: <a href=\"http:\/\/brl.ee.washington.edu\/about\/graduate-students\/\">Katherine Pratt<\/a>,\u00a0<a title=\"Howard Jay Chizeck\" href=\"http:\/\/brl.ee.washington.edu\/people\/faculty\/#chizeck\">Howard Chizeck<\/a><\/p>\n<h3><em>Related Media:<\/em><\/h3>\n<p>Our ongoing work in improving privacy and security of brain-computer interfaces was recently presented on <em><a title=\"NPR's All Things Considered\" href=\"http:\/\/www.npr.org\/blogs\/alltechconsidered\/2014\/05\/29\/317037186\/think-internet-data-mining-goes-too-far-then-you-wont-like-this\">NPR&#8217;s All Things Considered <\/a><\/em>and <a title=\"GeekWire Radio\" href=\"http:\/\/www.geekwire.com\/2014\/geekwire-radio-brain-computer-interfaces-future-personal-privacy\/\"><em>GeekWire Radio<\/em><\/a>.<\/p>\n<p><a href=\"https:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/05\/brainpcb.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-113\" src=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/brainpcb.png\" alt=\"NPRbrainpcb\" width=\"300\" height=\"156\" srcset=\"https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/brainpcb.png 566w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/brainpcb-300x156.png 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3><em>Publications:<\/em><\/h3>\n<p>T. Bonaci, M. R. Calo, H. J. Chizeck,<a href=\"http:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/05\/Bonaci_Calo_Chizeck_Ethics_2014.pdf\">\u00a0<\/a>&#8216;<a href=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/07128844.pdf\">App Stores for the Brain: Privacy and Security in Brain-Computer Interfaces<\/a>&#8216;,\u00a0IEEE Technology and Society Magazine, vol. 34, issue 2, June 2015<\/p>\n<p>T. Bonaci, J. Herron, C. Matlack, H. J. Chizeck,<a href=\"http:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/06\/BRL_Wiener_2014_final_and_approved.pdf\"> &#8216;Securing the Exocortex: A Twenty-First Century Cybernetics Challenge&#8217;<\/a>, the Proceedings of the IEEE 2014 Conference on Norbert Wiener in the 21st Century, Boston, MA, June 2014<\/p>\n<p>T. Bonaci, M. R. Calo, H. J. Chizeck,<a href=\"http:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/05\/Bonaci_Calo_Chizeck_Ethics_2014.pdf\"> &#8216;App Stores for the Brain: Privacy and Security in Brain-Computer Interfaces&#8217;<\/a>, the Proceedings of the IEEE International Symposium on Ethics in Engineering, Science and Technology, Chicago, IL, May 2014 (<a title=\"IEEE Ethics 2014\" href=\"http:\/\/sites.ieee.org\/ethics-conference\/students-ethics-competition\/http:\/\/\" target=\"_blank\" rel=\"noopener noreferrer\">best paper award<\/a>)<\/p>\n<h3><em>Presentations:<\/em><\/h3>\n<p>T. Bonaci, J. Herron, T. Libey, B. Mogen, H. J. Chizeck,<a href=\"https:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/06\/BRL_Wiener_2014_final_and_approved.pdf\">\u00a0<\/a>&#8216;How Susceptible is the Brain to the Side-Channel Private Information Extraction? An Experimental Analysis Using Non-invasive Brain-Computer Interfaces&#8217;, <a title=\"Society for Neuroscience 44th Annual Meeting\" href=\"http:\/\/www.sfn.org\/annual-meeting\/neuroscience-2014\">Society for Neuroscience 44th Annual Meeting<\/a>,\u00a0Washington, DC, November\u00a02014<\/p>\n<p>T. Bonaci, J. Herron, T. Libey, B. Mogen, H. J. Chizeck,<a href=\"https:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/06\/BRL_Wiener_2014_final_and_approved.pdf\">\u00a0<\/a>&#8216;How Susceptible is the Brain to the Side-Channel Private Information Extraction? An Experimental Analysis Using Non-invasive Brain-Computer Interfaces&#8217;,\u00a0<a title=\"International Neuroethics Society Annual Meeting\" href=\"http:\/\/www.neuroethicssociety.org\/2014-annual-meeting\">International Neuroethics Society Annual Meeting<\/a>,\u00a0Washington, DC, November\u00a02014 (<strong>AJOB top submission<\/strong>)<\/p>\n<p>T. Bonaci and H. J . Chizeck, &#8216;Experimental Analysis of Brain malware in Brain-Computer Interfaces&#8217;,<a title=\"NeuroFutures Conference 2014\" href=\"http:\/\/depts.washington.edu\/uwconf\/neurofutures\/\"> NeuroFutures Conference 2014<\/a>, June 2014, Seattle, WA<\/p>\n<h3><em>Patents:<\/em><\/h3>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>H. J. Chizeck, and T. Bonaci, \u201c<a title=\"Brain-Computer Interface Anonymizer\" href=\"http:\/\/www.google.com\/patents\/US20140228701\">Brain-Computer Interface Anonymizer<\/a>\u201d, Application Number: US 14\/174,818, February 2014.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3>\u00a0<em>Funding Sources:<\/em><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-376\" src=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/nsf1.png\" alt=\"nsf1\" width=\"150\" height=\"151\" srcset=\"https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/nsf1.png 692w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/nsf1-298x300.png 298w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/nsf1-150x150.png 150w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><a href=\"https:\/\/brl.ee.washington.edu\/wordpress\/wp-content\/uploads\/2014\/05\/CSNE.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-390 size-full\" src=\"https:\/\/ada.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/CSNE.png\" alt=\"CSNE\" width=\"759\" height=\"128\" srcset=\"https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/CSNE.png 759w, https:\/\/wp.ece.uw.edu\/wp-content\/uploads\/sites\/25\/2014\/05\/CSNE-300x51.png 300w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><\/a><\/p>\n<p>&nbsp;\t\t\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The problem Brain-computer interfaces (BCIs) represent a direct communication link between the brain and an external device. Recent experimental results show how electroencephalographic (EEG) signals, recorded from consumer-grade BCI devices, can be used to extract private information about a user. With sufficient computational power, this information can be exploited by others to make inferences about &#8230; <a title=\"BCI Security\" class=\"read-more\" href=\"https:\/\/wp.ece.uw.edu\/brl\/neural-engineering\/bci-security\/\" aria-label=\"Read more about BCI Security\">Read more<\/a><\/p>\n","protected":false},"author":40,"featured_media":0,"parent":24,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"tags":[],"class_list":["post-37","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/pages\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":0,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/pages\/24"}],"wp:attachment":[{"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/media?parent=37"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.ece.uw.edu\/brl\/wp-json\/wp\/v2\/tags?post=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}