Using global knowledge of users' typing traits to attack keystroke biometrics templates

Abdul Serwadda, Vir V. Phoha, Ankunda Kiremire

Research output: Chapter in Book/Entry/PoemConference contribution

12 Scopus citations

Abstract

Research in the field of keystroke dynamics (KD) has traditionally assumed impostor attacks to be originated by humans. However, recent studies have revealed that bots and various categories of malware have the capacity to implement intelligently crafted synthetic attacks against KD systems. In this paper we make a large-scale study of human typing traits, and then use the general observed statistical trends to train a tool that breaks password-KD templates. Our aim is to investigate how a synthetic attack designed with general knowledge about users' typing habits would perform against a password-KD co-authentication system in practice. Our initial results indicate that in the wake of synthetic impostor attacks, the incorporation of KD into regular password-based systems may not necessarily lessen the burden of users having to maintain strong passwords for guaranteed security.

Original languageEnglish (US)
Title of host publicationMM and Sec'11 - Proceedings of the 2011 ACM SIGMM Multimedia and Security Workshop
Pages51-59
Number of pages9
DOIs
StatePublished - 2011
Externally publishedYes
Event13th ACM Multimedia Security Workshop, MM and Sec'11 - Buffalo, NY, United States
Duration: Sep 29 2011Sep 30 2011

Publication series

NameMM and Sec'11 - Proceedings of the 2011 ACM SIGMM Multimedia and Security Workshop

Other

Other13th ACM Multimedia Security Workshop, MM and Sec'11
Country/TerritoryUnited States
CityBuffalo, NY
Period9/29/119/30/11

Keywords

  • biometrics
  • keystroke dynamics

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Vision and Pattern Recognition
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'Using global knowledge of users' typing traits to attack keystroke biometrics templates'. Together they form a unique fingerprint.

Cite this