Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Fast dictionary attacks on passwords using time-space tradeoff
Proceedings of the 12th ACM conference on Computer and communications security
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
The Effect of Clock Resolution on Keystroke Dynamics
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
GREYC keystroke: a benchmark for keystroke dynamics biometric systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Testing metrics for password creation policies by attacking large sets of revealed passwords
Proceedings of the 17th ACM conference on Computer and communications security
The security of modern password expiration: an algorithmic framework and empirical analysis
Proceedings of the 17th ACM conference on Computer and communications security
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Pattern Recognition Letters
Keystroke dynamics authentication for mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Research in the field of keystroke dynamics (KD) has traditionally assumed impostor attacks to be originated by humans. However, recent studies have revealed that bots and various categories of malware have the capacity to implement intelligently crafted synthetic attacks against KD systems. In this paper we make a large-scale study of human typing traits, and then use the general observed statistical trends to train a tool that breaks password-KD templates. Our aim is to investigate how a synthetic attack designed with general knowledge about users' typing habits would perform against a password-KD co-authentication system in practice. Our initial results indicate that in the wake of synthetic impostor attacks, the incorporation of KD into regular password-based systems may not necessarily lessen the burden of users having to maintain strong passwords for guaranteed security.