Detecting masquerading attack in software and in hardware | IEEE Conference Publication | IEEE Xplore