Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors

被引:2
作者
Van Hamme, Tim [1 ]
Garofalo, Giuseppe [1 ]
Preuveneers, Davy [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, B-3001 Leuven, Belgium
来源
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P | 2023年
关键词
Biometrics; Behaviometrics; Masterkey; Machine Learning; Security; BIOMETRIC RECOGNITION; AUTHENTICATION;
D O I
10.1109/EuroSP57164.2023.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents and systematically evaluates the first masterkey attack against free-text keystroke dynamics. A masterkey is a typing sequence that matches, hence successfully impersonates, a large part of the population. Therefore, masterkeys are effective tools for an adversary who aims to impersonate someone without knowledge of their typing behavior. On top of the attack itself, we present a new unifying evaluation framework for masterkey attacks that allow for the comparison with knowledge-based authentication factors. In other words, we unify the evaluation of password security with that of masterkey attacks and demonstrate that typing biometrics is approximately 20 times less secure than passwords and approximately two times less secure than a 4-digit pin. Lastly, we study the effect of demographics on typing biometrics, which, among others, provides novel insights into the effect of being a well-versed typist on security.
引用
收藏
页码:278 / 291
页数:14
相关论文
共 50 条
[1]   TypeNet: Scaling up Keystroke Biometrics [J].
Acien, Alejandro ;
Morales, Aythami ;
Vera-Rodriguez, Ruben ;
Fierrez, Julian ;
Monaco, John, V .
IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020), 2020,
[2]  
Alsultan A., 2013, International Journal of Computer Science Issues (IJCSI), V10, P1
[3]   An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices [J].
Antal, Margit ;
Szabo, Laszlo Zsolt .
2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, :343-350
[4]   Adversarial Biometric Recognition [A review on biometric system security from the adversarial machine-learning perspective] [J].
Biggio, Battista ;
Fumera, Giorgio ;
Russu, Paolo ;
Didaci, Luca ;
Roli, Fabio .
IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) :31-41
[5]  
Bonneau J., 2012, INT C FINANC CRYPT D, P25
[6]   The science of guessing: analyzing an anonymized corpus of 70 million passwords [J].
Bonneau, Joseph .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :538-552
[7]  
Bontrager P, 2018, INT CONF BIOMETR THE
[8]   Performance evaluation of continuous authentication systems [J].
Bours, Patrick ;
Mondal, Soumik .
IET BIOMETRICS, 2015, 4 (04) :220-226
[9]  
Boztas S, 1999, Tech. Rep., V6, P2
[10]  
Common Criteria BIO-iTC, BIOM SEC ITC BIOITC