A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
2012
Computers & security
The main focus of our work is evaluating the security of keystroke-dynamics authentication against synthetic forgery attacks. ...
In this paper, we consider the effects of synthetic forgery attacks in the context of biometric authentication systems. Our study is performed in a concrete keystroke-dynamic authentication system. ...
We evaluate the robustness of keystroke-based biometric authentication systems against a new type of forgery attacks. ...
doi:10.1016/j.cose.2011.10.001
fatcat:44wetfmwqjan3evccdbfvdg3jy
KSDSLD — A tool for keystroke dynamics synthesis & liveness detection
2023
Software Impacts
detection method that employs the latter as adversaries to train a classification model, which can distinguish human-written samples from synthetic forgeries. ...
Naïve implementations of keystroke dynamics verification are susceptible to presentation attacks with synthesized samples, leveraging partial or complete knowledge of the legitimate users' typing patterns ...
The software improves the pursuit of these research questions, as well as other related to presentation attacks against keystroke dynamics verification and liveness detection systems, by providing an open ...
doi:10.1016/j.simpa.2022.100454
fatcat:opedkefjxzd6jkth3affs3i7ji
Keystroke-dynamics authentication against synthetic forgeries
2010
Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target. ...
We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. ...
analyze the robustness of keystroke-dynamics authentication against synthetic forgery attacks. ...
doi:10.4108/icst.collaboratecom.2010.16
dblp:conf/colcom/StefanY10
fatcat:25tlegvsdfhc3jqhrme5ovccqa
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy - CODASPY '16
We implemented a statistical attack against sensorenhanced keystroke dynamics and evaluated its impact on detection accuracy. ...
Our findings suggest that sensor dynamics may be a stronger biometric authentication mechanism against recently proposed practical attacks. ...
[21] propose a snoop-forge-replay attack against a keystroke-based continuous verification system. ...
doi:10.1145/2857705.2857748
dblp:conf/codaspy/StanciuSCG16
fatcat:ic6qgb2n2vdrpgk6xpzidhrxqa
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes
2013
IEEE Transactions on Information Forensics and Security
and 2) how can we redesign keystroke-based continuous authentication systems that are resilient to forgery attacks? ...
against keystroke-based continuous user verification. ...
doi:10.1109/tifs.2013.2244091
fatcat:a5jhl67wfzatjif6ebz66z2kme
BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation
[article]
2022
arXiv
pre-print
We propose and evaluate a system based on Long-Short Term Memory (LSTM) architecture with triplet loss and modality fusion at score level. ...
Mobile behavioral biometrics have become a popular topic of research, reaching promising results in terms of authentication, exploiting a multimodal combination of touchscreen and background sensor data ...
These biometric systems, however, are prone to physical presentation attacks (spoofing) [2] and digital manipulations [3] and, just as well as knowledge-based systems (PIN codes, passwords, and lock ...
arXiv:2206.02502v2
fatcat:2iqebhde4bg4pjds7cqy2dzvbe
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
2021
IEEE Access
On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability. ...
To address these issues, a novel multimodal biometric system combining EEG and keystroke dynamics is proposed in this paper. ...
Such systems have many benefits: (i) they are robust against forgery and spoofing attacks as the signal acquisition is currently impossible through a remote interface and the signal depends on the state ...
doi:10.1109/access.2021.3092840
fatcat:uoxt32ws5jggzaxvz7de5t7ggm
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
[article]
2021
arXiv
pre-print
Traditional biometric systems like face, fingerprint, and iris recognition, keystroke dynamics, etc. are prone to cyber-attacks and suffer from different disadvantages. ...
With the rapid advancement of technology, different biometric user authentication, and identification systems are emerging. ...
Such systems have many benefits: (i) they are robust against forgery and spoofing attacks as the signal acquisition is currently impossible through a remote interface and the signal depends on the state ...
arXiv:2103.07274v2
fatcat:jlpqk765qncgtbnzcupznmiyom
Biometric Authentication and Identification Using Keystroke Dynamics: A Survey
2012
Journal of Pattern Recognition Research
Therefore in this paper, we provide a basic background of the psychological basis behind the use of keystroke dynamics. ...
A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an individual can be used to strengthen existing security techniques effectively and cheaply. ...
In the paper they showed the robustness of keystroke dynamics to synthetic forgery attacks by two simulated bots using a support vector machine (SVM) approach. Sheng et al. ...
doi:10.13176/11.427
fatcat:6dvdrraht5fmdeoausf4xqnc44
Keystroke Biometrics Ongoing Competition
2016
IEEE Access
This paper presents the first Keystroke Biometrics Ongoing Competition (KBOC) organized to establish a reproducible baseline in person authentication using keystroke biometrics. ...
The database includes genuine and attacker keystroke sequences from 300 users acquired in 4 different sessions distributed in a four month time span. ...
This scenario is usually related with long text sequences and continuous authentication services. ...
doi:10.1109/access.2016.2626718
fatcat:tszlym65zfbevbm6u4vrcjnstm
A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
[article]
2019
arXiv
pre-print
In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting ...
In a more recent article studied by Gong et al. (2016) , a new touch-based continuous authentication system, secure against forgery attacks, is proposed. ...
Using collected data from 32 users, the authors show that their proposed method is highly secure against attackers. ...
arXiv:1912.02629v1
fatcat:cnedguwpkveydnlbmdljm65t24
Signature-Based Biometric Authentication
[chapter]
2014
Studies in Computational Intelligence
Behavioural traits include voice, signature, keystroke pattern and gait. ...
In the last few years, substantial efforts have been devoted to the development of biometric-based authentication systems. ...
Moreover, the keystrokes of an individual using a system could be monitored unobtrusively as that person is keying in information. ...
doi:10.1007/978-3-319-05885-6_13
fatcat:g5qrfp47cng3tlgeaa62ddcuqm
Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud
2016
IEEE Transactions on Information Forensics and Security
For our experiments, we selected one compromised and four attacked gesture-based continuous authentication systems from the recent literature. ...
and a median ranging from 73% to 100% against all attacked systems using the randomization-based algorithm and the negative support vector attack. ...
This material is based on research sponsored in 16 part by the DARPA Active Authentication Program and the Brandeis Program under agreement numbers FA8750-12-2-0200 and N66001-15-C-4068, respectively ...
doi:10.1109/tifs.2016.2594132
fatcat:apszymdebrdejpxcgbzzgp3cfu
An efficient user verification system via mouse movements
2011
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11
Biometric authentication verifies a user based on its inherent, unique characteristics-who you are. ...
In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. ...
However, how vulnerable mouse-dynamicsbased approaches are to offline attacks, especially generative attacks which create concatenative synthetic forgeries [3] , is still an open question and will be ...
doi:10.1145/2046707.2046725
dblp:conf/ccs/ZhengPW11
fatcat:4kgy74y4czc5ngmjsxwldu7y5a
Biometrics: An Overview of the Technology, Issues and Applications
2012
International Journal of Computer Applications
This method is used to secure biometric authentication systems for commercial transactions against replay attacks. ...
layer down and attack systems at the initial authentication/enrolment stage. ...
doi:10.5120/4859-7134
fatcat:fdc2ej3nejeelfjxuxawbhgxhe
« Previous
Showing results 1 — 15 out of 59 results