skip to main content
10.1145/2037252.2037263acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Using global knowledge of users' typing traits to attack keystroke biometrics templates

Published:29 September 2011Publication History

ABSTRACT

Research in the field of keystroke dynamics (KD) has traditionally assumed impostor attacks to be originated by humans. However, recent studies have revealed that bots and various categories of malware have the capacity to implement intelligently crafted synthetic attacks against KD systems. In this paper we make a large-scale study of human typing traits, and then use the general observed statistical trends to train a tool that breaks password-KD templates. Our aim is to investigate how a synthetic attack designed with general knowledge about users' typing habits would perform against a password-KD co-authentication system in practice. Our initial results indicate that in the wake of synthetic impostor attacks, the incorporation of KD into regular password-based systems may not necessarily lessen the burden of users having to maintain strong passwords for guaranteed security.

References

  1. A. Adler. Can images be regenerated from biometric templates? In Proceedings of the Biometrics Consortium Conference, 2003.Google ScholarGoogle Scholar
  2. K. S. Balagani, V. V. Phoha, A. Ray, and S. Phoha. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters, Feb. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5:367--397, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. D and Y. D. Keystroke-dynamics authentication against synthetic forgeries. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom '10. IEEE Computer Society, October 2010.Google ScholarGoogle Scholar
  5. R. Giot, M. El-Abed, and C. Rosenberger. Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems. IEEE Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Hosseinzadeh and S. Krishnan. Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 38(6):816--826, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Joseph and P. Soren. The password thicket: Technical and market failures in human authentication on the web. In Ninth Workshop on the Economics of Information Security, WEIS, 2010, 2010.Google ScholarGoogle Scholar
  8. R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33:168--176, February 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Khandaker, K. Balagani, and V. Phoha. Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioural verification with keystrokes. In IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics, BIOM, 2011.Google ScholarGoogle Scholar
  10. K. Killourhy and R. Maxion. The effect of clock resolution on keystroke dynamics. In Recent Advances in Intrusion Detection, volume 5230/2008 of Lecture Notes in Computer Science, pages 331--350. Springer-Verlag, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. S. Killourhy and R. A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In DSN, pages 125--134, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. J. Leggett and G. Williams. Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies, 28(1):67--76, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. J. Leggett, G. Williams, M. Usnick, and M. Longnecker. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35(6):859--870, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Maiorana, P. Campisi, N. González-Carballo, and A. Neri. Keystroke dynamics authentication for mobile phones. In Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pages 21--26, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. In International Journal of Information Security, pages 73--82. ACM Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of the 12th ACM conference on Computer and communications security, CCS '05, pages 364--372, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2:40--47, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 40:614--634, March 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. A. Salthouse. Effects of age and skill in typing. Journal of Experimental Psychology: General, 113(3):345--371, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  20. T. A. Salthouse. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin, 99(3):303--319, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Scott. Upgrading and Repairing PCs. Que Publishing, 2003.Google ScholarGoogle Scholar
  22. D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th conference on USENIX Security Symposium - Volume 10, pages 25--25, Berkeley, CA, USA, 2001. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 162--175, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: an algorithmic framework and empirical analysis. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 176--186, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using global knowledge of users' typing traits to attack keystroke biometrics templates

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
      September 2011
      140 pages
      ISBN:9781450308069
      DOI:10.1145/2037252

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader