Mimicry Attacks on Smartphone Keystroke Authentication

被引:13
作者
Khan, Hassan [1 ]
Hengartner, Urs [2 ]
Vogel, Daniel [2 ]
机构
[1] Univ Guelph, Sch Comp Sci, Reynolds Bldg, Guelph, ON, Canada
[2] Univ Waterloo, Cheriton Sch Comp Sci, Davis Ctr, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mimicry attacks; authentication; behavioural biometrics; spoofing attacks; augmented reality; DYNAMICS;
D O I
10.1145/3372420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke behaviour-based authentication employs the unique typing behaviour of users to authenticate them. Recent such proposals for virtual keyboards on smartphones employ diverse temporal, contact, and spatial features to achieve over 95% accuracy. Consequently, they have been suggested as a second line of defense with text-based password authentication. We show that a state-of-the-art keystroke behaviour-based authentication scheme is highly vulnerable against mimicry attacks. While previous research used training interfaces to attack physical keyboards, we show that this approach has limited effectiveness against virtual keyboards. This is mainly due to the large number of diverse features that the attacker needs to mimic for virtual keyboards. We address this challenge by developing an augmented reality-based app that resides on the attacker's smartphone and leverages computer vision and keystroke data to provide real-time guidance during password entry on the victim's phone. In addition, we propose an audiovisual attack in which the attacker overlays transparent film printed with spatial pointers on the victim's device and uses audio cues to match the temporal behaviour of the victim. Both attacks require neither tampering or installing software on the victim's device nor specialized hardware. We conduct experiments with 30 users to mount over 400 mimicry attacks. We show that our methods enable an attacker to mimic keystroke behaviour on virtual keyboards with little effort. We also demonstrate the extensibility of our augmented reality-based technique by successfully mounting mimicry attacks on a swiping behaviour-based continuous authentication system.
引用
收藏
页数:34
相关论文
共 50 条
[1]   A fixed point theorem for cyclic generalized contractions in metric spaces (vol 2012, 122, 2012) [J].
Alghamdi, Maryam A. ;
Petrusel, Adrian ;
Shahzad, Naseer .
FIXED POINT THEORY AND APPLICATIONS, 2013,
[2]   Revisiting Defenses against Large-Scale Online Password Guessing Attacks [J].
Alsaleh, Mansour ;
Mannan, Mohammad ;
van Oorschot, P. C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) :128-141
[3]  
Anderson F, 2013, SONS OF THE FATHER: GEORGE WASHINGTON AND HIS PROTEGES, P21
[4]  
[Anonymous], 2019, REGISTER
[5]  
[Anonymous], 2012, P 10 INT C MOB SYST, DOI [10.1145/2307636.2307666, DOI 10.1145/2307636.2307666]
[6]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[7]  
Bao W, 2009, PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, P233
[8]  
Bell Karissa, 2017, NEW ARKIT IPHONE APP
[9]  
Bianchi Antonio, 2015, P IEEE S SEC PRIV OA
[10]  
Bonneau Joseph, 2012, P IEEE S SEC PRIV OA