Identity authentication based on keystroke latencies
Communications of the ACM
Applications of keystroke analysis for improved login security and continuous user authentication
Information systems security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Exploiting smart-phone USB connectivity for fun and profit
Proceedings of the 26th Annual Computer Security Applications Conference
Attestation & Authentication for USB Communications
SERE-C '12 Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability Companion
Hi-index | 0.00 |
Recently, a new class of USB based attacks has emerged which unlike previous USB based threats does not exploit any vulnerability or depend on any operating system feature. The USB HID attack vector utilizes an emulated keyboard and onboard flash memory storage to simulate keystrokes on a victim machine. In this paper we propose an anomaly based approach to detect such an attack using a biometric called keystroke dynamics.