Empirical keystroke analysis in passwords

被引:0
|
作者
Montalvao, Jugurta [1 ]
Freire, Eduardo O. [1 ]
Bezerra, Murilo A., Jr. [1 ]
Garcia, Rodolfo [2 ]
机构
[1] Univ Fed Sergipe, Dept Elect Engn, Ave Marechal Rondon S-N, Sao Cristovao, SE, Brazil
[2] Sistemas com Inteligencia Artificial, Aracaju, Brazil
来源
5TH ISSNIP-IEEE BIOSIGNALS AND BIOROBOTICS CONFERENCE (2014): BIOSIGNALS AND ROBOTICS FOR BETTER AND SAFER LIVING | 2014年
关键词
Biometrics; keystroke; password; AUTHENTICATION;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Rhythmic patterns in passwords are addressed as a kind of biometrics. Experimental results are obtained through two publicly available databases. A preprocessing step (time interval equalization) is applied to both down-down keystroke latency and key hold-down time. Improvements from this preprocessing step are shown through experiments intentionally adapted from papers by the owners of both databases. Afterwards our main experiments are guided by questions Q1: How long does it take for a typist to develop a proper timing signature associated to a new meaningless password? And Q2: How does the number of symbols affect biometric performance? Measurements show that for the password .tie5Roanl typists need many dozens of repetitions to stabilize their typing rhythm. As for question Q2, experimental results show better performance for the shorter password try4-mbs, and that even for longest one studied, .tie5Roanl, there is room for performance improvement.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 50 条
  • [11] Stealing Passwords by Observing Hands Movement
    Shukla, Diksha
    Phoha, Vir V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3086 - 3101
  • [12] BioTouchPass: Handwritten Passwords for Touchscreen Biometrics
    Tolosana, Ruben
    Vera-Rodriguez, Ruben
    Fierrez, Julian
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (07) : 1532 - 1543
  • [13] Motion Passwords
    Rack, Christian
    Schach, Lukas
    Achter, Felix
    Shehada, Yousof
    Lin, Jinghuai
    Latoschik, Marc Erich
    30TH ACM SYMPOSIUM ON VIRTUAL REALITY SOFTWARE AND TECHNOLOGY, VRST 2024, 2024,
  • [14] Authenticating mobile phone users using keystroke analysis
    Clarke, N. L.
    Furnell, S. M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) : 1 - 14
  • [15] Authenticating mobile phone users using keystroke analysis
    N. L. Clarke
    S. M. Furnell
    International Journal of Information Security, 2007, 6 : 1 - 14
  • [16] Account-Sharing Detection Through Keystroke Dynamics Analysis
    Hwang, Seong-seob
    Lee, Hyoung-joo
    Cho, Sungzoon
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2009, 14 (02) : 109 - 125
  • [17] A Keystroke Dynamics Based Approach for Continuous Authentication
    El Menshawy, Dina
    Mokhtar, Hoda M. O.
    Hegazy, Osman
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2014, 2014, 424 : 415 - 424
  • [18] Dynamic keystroke pattern analysis and classifiers with competence for user recognition
    Porwik, Piotr
    Doroz, Rafal
    Wesolowski, Tomasz Emanuel
    APPLIED SOFT COMPUTING, 2021, 99
  • [19] Modular Logic of Authentication Using Dynamic Keystroke Pattern Analysis
    Bhattasali, Tapalina
    Panasiuk, Piotr
    Saeed, Khalid
    Chaki, Nabendu
    Chaki, Rituparna
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
  • [20] Synthesis of Secure Passwords
    Sato, Tomoki
    Kikuchi, Hiroaki
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 35 - 43