Header

UZH-Logo

Maintenance Infos

Eight reasons why cybersecurity on novel generations of brain-computer interfaces must be prioritized


López Bernal, Sergio; Huertas Celdran, Alberto; Martínez Pérez, Gregorio (2021). Eight reasons why cybersecurity on novel generations of brain-computer interfaces must be prioritized. arXiv 04968, University of Zurich.

Abstract

This article presents eight neural cyberattacks affecting spontaneous neural activity, inspired by well-known cyberattacks from the computer science domain: Neural Flooding, Neural Jamming, Neural Scanning, Neural Selective Forwarding, Neural Spoofing, Neural Sybil, Neural Sinkhole and Neural Nonce. These cyberattacks are based on the exploitation of vulnerabilities existing in the new generation of Brain-Computer Interfaces. After presenting their formal definitions, the cyberattacks have been implemented over a neuronal simulation. To evaluate the impact of each cyberattack, they have been implemented in a Convolutional Neural Network (CNN) simulating a portion of a mouse's visual cortex. This implementation is based on existing literature indicating the similarities that CNNs have with neuronal structures from the visual cortex. Some conclusions are also provided, indicating that Neural Nonce and Neural Jamming are the most impactful cyberattacks for short-term effects, while Neural Scanning and Neural Nonce are the most damaging for long-term effects.

Abstract

This article presents eight neural cyberattacks affecting spontaneous neural activity, inspired by well-known cyberattacks from the computer science domain: Neural Flooding, Neural Jamming, Neural Scanning, Neural Selective Forwarding, Neural Spoofing, Neural Sybil, Neural Sinkhole and Neural Nonce. These cyberattacks are based on the exploitation of vulnerabilities existing in the new generation of Brain-Computer Interfaces. After presenting their formal definitions, the cyberattacks have been implemented over a neuronal simulation. To evaluate the impact of each cyberattack, they have been implemented in a Convolutional Neural Network (CNN) simulating a portion of a mouse's visual cortex. This implementation is based on existing literature indicating the similarities that CNNs have with neuronal structures from the visual cortex. Some conclusions are also provided, indicating that Neural Nonce and Neural Jamming are the most impactful cyberattacks for short-term effects, while Neural Scanning and Neural Nonce are the most damaging for long-term effects.

Statistics

Citations

Dimensions.ai Metrics

Altmetrics

Downloads

0 downloads since deposited on 06 Feb 2023
0 downloads since 12 months

Additional indexing

Item Type:Working Paper
Communities & Collections:03 Faculty of Economics > Department of Informatics
Dewey Decimal Classification:000 Computer science, knowledge & systems
Uncontrolled Keywords:Cybersecurity, Brain-Computer Interfaces, Neuronal Cyberattacks,Taxonomy
Language:English
Date:9 June 2021
Deposited On:06 Feb 2023 08:50
Last Modified:21 Feb 2023 08:23
Publisher:ACM Digital library
Series Name:arXiv
ISSN:2331-8422
OA Status:Green
Free access at:Publisher DOI. An embargo period may apply.
Publisher DOI:https://doi.org/10.48550/arXiv.2106.04968
Official URL:https://doi.org/10.48550/arXiv.2106.04968
Other Identification Number:merlin-id:23180
  • Content: Published Version
  • Language: English
  • Licence: Creative Commons: Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)