• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Keystroke dynamics”, (2003)

by J Ilonen
Add To MetaCart

Tools

Sorted by:
Results 1 - 8 of 8

Timing attacks on pin input devices

by Denis Foo Kune, Yongdae Kim - In Proceedings of the 17th ACM conference on Computer and communications security , 2010
"... Keypads are commonly used to enter personal identification numbers (PIN) which are intended to authenticate a user based on what they know. A number of those keypads such as ATM inputs and door keypads provide an audio feedback to the user for each button pressed. Such audio feedback are observable ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Keypads are commonly used to enter personal identification numbers (PIN) which are intended to authenticate a user based on what they know. A number of those keypads such as ATM inputs and door keypads provide an audio feedback to the user for each button pressed. Such audio feedback are observable from a modest distance. We are looking at quantifying the information leaking from delays between acoustic feedback pulses. Preliminary experiments suggest that by using a Hidden Markov Model, it might be possible to substantially narrow the search space. A subsequentbrute force search on the reduced search space could be possible without triggering alerts, lockouts or other mechanisms design to thwart plain brute force attempts.
(Show Context)

Citation Context

...oard. We are building a Gaussian model for the inter-key delays to produce a statistical model that would work across many users. It has been reported that users tend to have unique keystroke rhythms =-=[2]-=- which have been proposed for inclusion in current authentication mechanisms. By producing a distinct Gaussian distribution for equidistant key pairs, we take into account the variations by user while...

by

by Harikrishnan Bhanu, Harikrishnan Bhanu , 2010
"... ii In most secure communication standards today, additional latency is kept to a minimum to preserve the Quality-of-Service. As a result, it is possible to mount side-channel attacks using timing analysis. In this thesis we discuss the viability of these attacks, and demonstrate them by inferring Hi ..."
Abstract - Add to MetaCart
ii In most secure communication standards today, additional latency is kept to a minimum to preserve the Quality-of-Service. As a result, it is possible to mount side-channel attacks using timing analysis. In this thesis we discuss the viability of these attacks, and demonstrate them by inferring Hidden Markov Models of protocols. These Hidden Markov Models can be used to both detect protocol use and infer information about protocol state. We create experiments that use Markov models to generate traffic and show that we can accurately reconstruct models under many circumstances. We analyze what occurs when timing delays have enough jitter that we can not accurately assign packets to bins. Finally, we show that we can accurately identify the language used for cryptographically protected interactive sessions – Italian or English – on-line with as few as 77 symbols. A maximum-likelihood estimator, the forward-backward procedure, and confidence interval analysis are compared. iii

A neural-statistical modeling approach for keystroke . . .

by Özlem Güven , 2006
"... The main problem of the computer and information systems is the security, which is to protect the system from the attacks of imposter or unauthorized users. In order to supply better security, it must be determined clearly while system access that if the claimed one is authorized user known by the s ..."
Abstract - Add to MetaCart
The main problem of the computer and information systems is the security, which is to protect the system from the attacks of imposter or unauthorized users. In order to supply better security, it must be determined clearly while system access that if the claimed one is authorized user known by the system or not. Recently, biometric security systems technology is developed and added to the typical authentication systems, which are consist of username and PIN or password query, aiming to get higher security in system access. The keystroke pattern recognition system is chosen as one of the biometric security system and proposed to perform a classification in this thesis. In order to achieve this, a perspective is developed under the knowledge of the classification algorithms used earlier in keystroke pattern recognition systems. According to this, a model is designed which uses hybrid combination of two different algorithms. One of them is the statistical algorithm which is the very firstly used one in pattern recognition and the other one is the neural networks. In the model, the statistical algorithm formulations are embedded into the neural network architecture. Designed algorithm model is described in detail and tested with sample user datasets and performance results are presented. When thinking about need of new approaches in the classification algorithms in keystroke pattern recognition, this study can be a starting point to further enhancements with its perspective on the subject.

Advanced Authentication Scheme Using a Predefined Keystroke Structure

by Abdulameer K Hussain , Mohammad M Alnabhan
"... ABSTRACT ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ethods. For example, it is possible to provide strong authentication in the password authentication scheme by combining it with keystroke dynamics [1]. Keystroke is a behavioural biometric modality monitoring the way individuals’ type on the keyboard [2]. The basic idea of keystroke dynamics is based on the assumption that people type in uniquely different characteristic manners. Hence, this method depends on identifying users certain habitual typing rhythm patterns [3]. Different names of keystroke dynamics are used: keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms [8]. One of the advantages of keystroke dynamics is that it is inexpensive because it can be used without any additional hardware. In addition, the user acceptance of a keystroke dynamics biometric system is considered very high [16, 10]. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 2, April 2014 164 Several research works had addressed the usage of keystroke dynamics in improving authentication systems performance. However, still keystroke drawbacks such as users typing time deviation needs to be considered. This work considers developing keystroke dynami...

DOI: 10.1109/CTS.2009.5067478 Keystroke Dynamics Authentication For Collaborative Systems

by Romain Giot, Mohamad El-abed, Christophe Rosenberger
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...er-key time : which is the delay between the release of a key and the pressure of the next one (T3-T2). Figure 2. Capture Information In Keystroke Dynamics Systems Other measures can also be captured =-=[8]-=- : the duration of password typing, the use of “invisible keys” (like BACKSPACE) in order to add entropy (or count the typing error rate of the user). Data cleaning can be done to improve the system's...

Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns

by Prima Chairunn, Nam Pham, Urs Hengartner
"... Abstract. The lack of privacy protection for Internet users has been identified as a major problem in modern web browsers. Despite potentially highrisk of identification bytypingpatterns, this topic has received little attention in both the research and general community.In this paper we presentasim ..."
Abstract - Add to MetaCart
Abstract. The lack of privacy protection for Internet users has been identified as a major problem in modern web browsers. Despite potentially highrisk of identification bytypingpatterns, this topic has received little attention in both the research and general community.In this paper we presentasimple butefficient statistical detection model for constructing users ’ identity from their typing patterns. Extensive experiments are conducted to justify the accuracy of our model. Using this model, online adversaries could uncover the identity of Web users even if they are using anonymizing services. Our goal is to raise awareness of this privacy risk to general Internet users and encourage countermeasures in future implementations of anonymous browsing techniques.
(Show Context)

Citation Context

...attern can be used for analysis, such as: digraph, trigraph, and tetragraph latencies (interval between two, three, and foursuccessivecharacters)[8],overalltypingspeed,errorfrequency,andkey-hold time =-=[7]-=-. We primarily use digraph latency information in our model, however it can be extended to consider the other aspects mentioned earlier. The problem of how best to aggregate information from different...

Mixing and Matching Human Traits using Hand Typing

by Manoj Devare
"... In this paper we have discussed few findings with respect to hand typing. The user behavior of simple typing for the lower case letters, and key stroke behavior during combination of lower and upper case letters is observed. During the entire cases user’s keystroke latencies are measured and the use ..."
Abstract - Add to MetaCart
In this paper we have discussed few findings with respect to hand typing. The user behavior of simple typing for the lower case letters, and key stroke behavior during combination of lower and upper case letters is observed. During the entire cases user’s keystroke latencies are measured and the use of combination of “shift key ” and “caps lock ” are observed. Here, the targeted (clear) text is in front of the user and key strokes were recorded. The results are illustrated for the traits finding which will be useful for verification of the user. The deliverable outcome of this work is a timer based program and a deployable library for running in background polling towards the keystrokes.
(Show Context)

Citation Context

...s done. The 2International Journal of Computer Applications (0975 – 8887) Volume 73– No.18, July 2013 suggestions to develop the new protocol by considering the timing attacks is given in this work. =-=[11]-=- [16] The validity of the password using a keystroke dynamics enclosing statistical analysis program is developed. The information gathered from the user trials of this program is used to confirm that...

1Keystroke-Dynamics Authentication Against Synthetic Forgeries

by Deian Stefan, Danfeng (daphne Yao
"... Abstract—We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user’s typing patterns. We evaluate the robustness ..."
Abstract - Add to MetaCart
Abstract—We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user’s typing patterns. We evaluate the robustness of TUBA through comprehensive experimen-tal evaluation including two series of simulated bots. Support vector machine is used for classification. Our results based on 20 users’ keystroke data are reported. Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target. TUBA is particularly suitable for detecting extrusion in organizations and protecting the integrity of hosts in collaborative environments, as well as authentication. Index Terms—Keystroke dynamics, authentication, malware detection, forgery. 1
(Show Context)

Citation Context

...ics, authentication, malware detection, forgery. 1 INTRODUCTION Keystroke-dynamics based authentication is a cheap biometric mechanism that has been proven accurate in distinguishing individuals [2], =-=[7]-=-, [9], [10], [17], [21]. Most of the attack models considered in keystroke-dynamics literature assume the attackers are humans, e.g., a colleague of Alice trying to log in as Alice. However, there has...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University