Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








59 Hits in 3.1 sec

Robustness of keystroke-dynamics based biometrics against synthetic forgeries

Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao
2012 Computers & security  
The main focus of our work is evaluating the security of keystroke-dynamics authentication against synthetic forgery attacks.  ...  In this paper, we consider the effects of synthetic forgery attacks in the context of biometric authentication systems. Our study is performed in a concrete keystroke-dynamic authentication system.  ...  We evaluate the robustness of keystroke-based biometric authentication systems against a new type of forgery attacks.  ... 
doi:10.1016/j.cose.2011.10.001 fatcat:44wetfmwqjan3evccdbfvdg3jy

KSDSLD — A tool for keystroke dynamics synthesis & liveness detection

Nahuel González
2023 Software Impacts  
detection method that employs the latter as adversaries to train a classification model, which can distinguish human-written samples from synthetic forgeries.  ...  Naïve implementations of keystroke dynamics verification are susceptible to presentation attacks with synthesized samples, leveraging partial or complete knowledge of the legitimate users' typing patterns  ...  The software improves the pursuit of these research questions, as well as other related to presentation attacks against keystroke dynamics verification and liveness detection systems, by providing an open  ... 
doi:10.1016/j.simpa.2022.100454 fatcat:opedkefjxzd6jkth3affs3i7ji

Keystroke-dynamics authentication against synthetic forgeries

Deian Stefan, Danfeng (Daphne) Yao
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target.  ...  We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks.  ...  analyze the robustness of keystroke-dynamics authentication against synthetic forgery attacks.  ... 
doi:10.4108/icst.collaboratecom.2010.16 dblp:conf/colcom/StefanY10 fatcat:25tlegvsdfhc3jqhrme5ovccqa

On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks

Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida
2016 Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy - CODASPY '16  
We implemented a statistical attack against sensorenhanced keystroke dynamics and evaluated its impact on detection accuracy.  ...  Our findings suggest that sensor dynamics may be a stronger biometric authentication mechanism against recently proposed practical attacks.  ...  [21] propose a snoop-forge-replay attack against a keystroke-based continuous verification system.  ... 
doi:10.1145/2857705.2857748 dblp:conf/codaspy/StanciuSCG16 fatcat:ic6qgb2n2vdrpgk6xpzidhrxqa

Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes

Khandaker A. Rahman, Kiran S. Balagani, Vir V. Phoha
2013 IEEE Transactions on Information Forensics and Security  
and 2) how can we redesign keystroke-based continuous authentication systems that are resilient to forgery attacks?  ...  against keystroke-based continuous user verification.  ... 
doi:10.1109/tifs.2013.2244091 fatcat:a5jhl67wfzatjif6ebz66z2kme

BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation [article]

Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales
2022 arXiv   pre-print
We propose and evaluate a system based on Long-Short Term Memory (LSTM) architecture with triplet loss and modality fusion at score level.  ...  Mobile behavioral biometrics have become a popular topic of research, reaching promising results in terms of authentication, exploiting a multimodal combination of touchscreen and background sensor data  ...  These biometric systems, however, are prone to physical presentation attacks (spoofing) [2] and digital manipulations [3] and, just as well as knowledge-based systems (PIN codes, passwords, and lock  ... 
arXiv:2206.02502v2 fatcat:2iqebhde4bg4pjds7cqy2dzvbe

Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms

Arafat Rahman, Muhammad E. H. CHowdhury, Amith Khandakar, Serkan Kiranyaz, Kh Shahriya Zaman, Mamun Bin Ibne Reaz, Mohammad Tariqul Islam, Maymouna Ezeddin, Muhammad Abdul Kadir
2021 IEEE Access  
On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability.  ...  To address these issues, a novel multimodal biometric system combining EEG and keystroke dynamics is proposed in this paper.  ...  Such systems have many benefits: (i) they are robust against forgery and spoofing attacks as the signal acquisition is currently impossible through a remote interface and the signal depends on the state  ... 
doi:10.1109/access.2021.3092840 fatcat:uoxt32ws5jggzaxvz7de5t7ggm

Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms [article]

Arafat Rahman, Muhammad E. H. Chowdhury, Amith Khandakar, Serkan Kiranyaz, Kh Shahriya Zaman, Mamun Bin Ibne Reaz, Mohammad Tariqul Islam, Muhammad Abdul Kadir
2021 arXiv   pre-print
Traditional biometric systems like face, fingerprint, and iris recognition, keystroke dynamics, etc. are prone to cyber-attacks and suffer from different disadvantages.  ...  With the rapid advancement of technology, different biometric user authentication, and identification systems are emerging.  ...  Such systems have many benefits: (i) they are robust against forgery and spoofing attacks as the signal acquisition is currently impossible through a remote interface and the signal depends on the state  ... 
arXiv:2103.07274v2 fatcat:jlpqk765qncgtbnzcupznmiyom

Biometric Authentication and Identification Using Keystroke Dynamics: A Survey

Salil Partha Banerjee, Damon Woodard
2012 Journal of Pattern Recognition Research  
Therefore in this paper, we provide a basic background of the psychological basis behind the use of keystroke dynamics.  ...  A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an individual can be used to strengthen existing security techniques effectively and cheaply.  ...  In the paper they showed the robustness of keystroke dynamics to synthetic forgery attacks by two simulated bots using a support vector machine (SVM) approach. Sheng et al.  ... 
doi:10.13176/11.427 fatcat:6dvdrraht5fmdeoausf4xqnc44

Keystroke Biometrics Ongoing Competition

Aythami Morales, Julian Fierrez, Ruben Tolosana, Javier Ortega-Garcia, Javier Galbally, Marta Gomez-Barrero, Andre Anjos, Sebastien Marcel
2016 IEEE Access  
This paper presents the first Keystroke Biometrics Ongoing Competition (KBOC) organized to establish a reproducible baseline in person authentication using keystroke biometrics.  ...  The database includes genuine and attacker keystroke sequences from 300 users acquired in 4 different sessions distributed in a four month time span.  ...  This scenario is usually related with long text sequences and continuous authentication services.  ... 
doi:10.1109/access.2016.2626718 fatcat:tszlym65zfbevbm6u4vrcjnstm

A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection [article]

Niloofar Yousefi, Marie Alaghband, Ivan Garibay
2019 arXiv   pre-print
In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting  ...  In a more recent article studied by Gong et al. (2016) , a new touch-based continuous authentication system, secure against forgery attacks, is proposed.  ...  Using collected data from 32 users, the authors show that their proposed method is highly secure against attackers.  ... 
arXiv:1912.02629v1 fatcat:cnedguwpkveydnlbmdljm65t24

Signature-Based Biometric Authentication [chapter]

Srikanta Pal, Umapada Pal, Michael Blumenstein
2014 Studies in Computational Intelligence  
Behavioural traits include voice, signature, keystroke pattern and gait.  ...  In the last few years, substantial efforts have been devoted to the development of biometric-based authentication systems.  ...  Moreover, the keystrokes of an individual using a system could be monitored unobtrusively as that person is keying in information.  ... 
doi:10.1007/978-3-319-05885-6_13 fatcat:g5qrfp47cng3tlgeaa62ddcuqm

Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud

Mohammad Al-Rubaie, J. Morris Chang
2016 IEEE Transactions on Information Forensics and Security  
For our experiments, we selected one compromised and four attacked gesture-based continuous authentication systems from the recent literature.  ...  and a median ranging from 73% to 100% against all attacked systems using the randomization-based algorithm and the negative support vector attack.  ...  This material is based on research sponsored in 16 part by the DARPA Active Authentication Program and the Brandeis Program under agreement numbers FA8750-12-2-0200 and N66001-15-C-4068, respectively  ... 
doi:10.1109/tifs.2016.2594132 fatcat:apszymdebrdejpxcgbzzgp3cfu

An efficient user verification system via mouse movements

Nan Zheng, Aaron Paloski, Haining Wang
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
Biometric authentication verifies a user based on its inherent, unique characteristics-who you are.  ...  In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user.  ...  However, how vulnerable mouse-dynamicsbased approaches are to offline attacks, especially generative attacks which create concatenative synthetic forgeries [3] , is still an open question and will be  ... 
doi:10.1145/2046707.2046725 dblp:conf/ccs/ZhengPW11 fatcat:4kgy74y4czc5ngmjsxwldu7y5a

Biometrics: An Overview of the Technology, Issues and Applications

S. Asha, C. Chellappan
2012 International Journal of Computer Applications  
This method is used to secure biometric authentication systems for commercial transactions against replay attacks.  ...  layer down and attack systems at the initial authentication/enrolment stage.  ... 
doi:10.5120/4859-7134 fatcat:fdc2ej3nejeelfjxuxawbhgxhe
« Previous Showing results 1 — 15 out of 59 results