Conference Proceeding Article
Keystroke dynamics refer to information about the typing patterns of individuals, such as the relative timing when the individual presses and releases each key. Prior studies suggest that such patterns are unique and cannot be easily imitated. This lays the foundation for the use of keystroke biometrics in authentication systems. The research effort in this area has thus far focused on novel detection techniques to differentiate between legitimate users and imposters. In this paper, we demonstrate a novel feedback and training interface named Mimesis. Mimesis provides both positive and negative feedback on the differences between a submitted pattern vs. a reference pattern. This allows one person to imitate another through incremental adjustment of typing pattern. We show that even for targets whose typing patterns are only partially known, training with Mimesis allows attackers to defeat one of the best anomaly detection engines using keystroke biometrics. For a group of 84 participants playing the role of attackers and 2 eight-character passwords of different difficulty, the false acceptance rate (FAR) of the easy and difficult password increases from 0.24 and 0.20 respectively (before Mimesis training) to 0.63 and 0.42 respectively (after Mimesis training with partial information of the victim). With full information, the FAR increases to 0.99 for both passwords for the 14 best attackers.
Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24-27 February
City or Country
San Diego, CA
TEY, Chee Meng; GUPTA, Payas; and GAO, Debin.
I Can Be You: Questioning the Use of Keystroke Dynamics as Biometrics. (2013). Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24-27 February. 1-16. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/1699
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.