Mimicry Attacks on Smartphone Keystroke Authentication

被引:13
作者
Khan, Hassan [1 ]
Hengartner, Urs [2 ]
Vogel, Daniel [2 ]
机构
[1] Univ Guelph, Sch Comp Sci, Reynolds Bldg, Guelph, ON, Canada
[2] Univ Waterloo, Cheriton Sch Comp Sci, Davis Ctr, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Mimicry attacks; authentication; behavioural biometrics; spoofing attacks; augmented reality; DYNAMICS;
D O I
10.1145/3372420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke behaviour-based authentication employs the unique typing behaviour of users to authenticate them. Recent such proposals for virtual keyboards on smartphones employ diverse temporal, contact, and spatial features to achieve over 95% accuracy. Consequently, they have been suggested as a second line of defense with text-based password authentication. We show that a state-of-the-art keystroke behaviour-based authentication scheme is highly vulnerable against mimicry attacks. While previous research used training interfaces to attack physical keyboards, we show that this approach has limited effectiveness against virtual keyboards. This is mainly due to the large number of diverse features that the attacker needs to mimic for virtual keyboards. We address this challenge by developing an augmented reality-based app that resides on the attacker's smartphone and leverages computer vision and keystroke data to provide real-time guidance during password entry on the victim's phone. In addition, we propose an audiovisual attack in which the attacker overlays transparent film printed with spatial pointers on the victim's device and uses audio cues to match the temporal behaviour of the victim. Both attacks require neither tampering or installing software on the victim's device nor specialized hardware. We conduct experiments with 30 users to mount over 400 mimicry attacks. We show that our methods enable an attacker to mimic keystroke behaviour on virtual keyboards with little effort. We also demonstrate the extensibility of our augmented reality-based technique by successfully mounting mimicry attacks on a swiping behaviour-based continuous authentication system.
引用
收藏
页数:34
相关论文
共 50 条
[11]  
Boyle Matthew, 2011, P 9 INT C MOB SYST A
[12]  
Burgbacher Ulrich, 2014, P 32 ANN ACM C HUM F
[13]  
Buschek D, 2015, P 33 ANN ACM C HUM F
[14]  
Casiez Gry., 2012, SIGCHI C HUMAN FACTO, P2527, DOI DOI 10.1145/2207676.2208639
[15]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[16]   Authenticating mobile phone users using keystroke analysis [J].
Clarke, N. L. ;
Furnell, S. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) :1-14
[17]   A GENERAL-APPROACH TO CONNECTED-COMPONENT LABELING FOR ARBITRARY IMAGE REPRESENTATIONS [J].
DILLENCOURT, MB ;
SAMET, H ;
TAMMINEN, M .
JOURNAL OF THE ACM, 1992, 39 (02) :253-280
[18]  
Douglas D., 1973, Cartographica, Int. J. Geogr. Inform. Geovisual., V10, P112, DOI [DOI 10.3138/FM57-6770-U75U-7727, 10.3138/FM57-6770-U75U-7727]
[19]  
Draffin Benjamin., 2013, MOBICASE, P184
[20]  
Dubey S, 2018, SPRBRIEF ELECT, P25, DOI 10.1007/978-981-10-6280-3_4