Empirical keystroke analysis in passwords

被引:0
作者
Montalvao, Jugurta [1 ]
Freire, Eduardo O. [1 ]
Bezerra, Murilo A., Jr. [1 ]
Garcia, Rodolfo [2 ]
机构
[1] Univ Fed Sergipe, Dept Elect Engn, Ave Marechal Rondon S-N, Sao Cristovao, SE, Brazil
[2] Sistemas com Inteligencia Artificial, Aracaju, Brazil
来源
5TH ISSNIP-IEEE BIOSIGNALS AND BIOROBOTICS CONFERENCE (2014): BIOSIGNALS AND ROBOTICS FOR BETTER AND SAFER LIVING | 2014年
关键词
Biometrics; keystroke; password; AUTHENTICATION;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Rhythmic patterns in passwords are addressed as a kind of biometrics. Experimental results are obtained through two publicly available databases. A preprocessing step (time interval equalization) is applied to both down-down keystroke latency and key hold-down time. Improvements from this preprocessing step are shown through experiments intentionally adapted from papers by the owners of both databases. Afterwards our main experiments are guided by questions Q1: How long does it take for a typist to develop a proper timing signature associated to a new meaningless password? And Q2: How does the number of symbols affect biometric performance? Measurements show that for the password .tie5Roanl typists need many dozens of repetitions to stabilize their typing rhythm. As for question Q2, experimental results show better performance for the shorter password try4-mbs, and that even for longest one studied, .tie5Roanl, there is room for performance improvement.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 50 条
  • [31] Analysis of Keystroke Dynamics For the Generation of Synthetic Datasets
    Migdal, Denis
    Rosenberger, Christophe
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 339 - 344
  • [32] Improving static audio keystroke analysis by score fusion of acoustic and timing data
    Matúš Pleva
    Patrick Bours
    Stanislav Ondáš
    Jozef Juhár
    [J]. Multimedia Tools and Applications, 2017, 76 : 25749 - 25766
  • [33] Examining the Strength of Three Word Passwords
    Fraser, William
    Broadbent, Matthew
    Pitropakis, Nikolaos
    Chrysoulas, Christos
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 119 - 133
  • [34] RHU Keystroke Touchscreen Benchmark
    El-Abed, Mohamad
    Dafer, Mostafa
    Rosenberger, Christophe
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 363 - 368
  • [35] Authenticating passwords over an insecure channel
    Wu, TC
    Sung, HS
    [J]. COMPUTERS & SECURITY, 1996, 15 (05) : 431 - 439
  • [36] Brute Force Analysis of PsychoPass-generated Passwords
    Brumen, B.
    Cernezel, A.
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1366 - 1371
  • [37] Time Signatures - An Implementation of Keystroke and Click Patterns for Practical and Secure Authentication
    Sharif, Muhammad
    Faiz, Tariq
    Raza, Mudassar
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 571 - 574
  • [38] From Passwords to Biometrics: In Pursuit of a Panacea
    Furnell, S. M.
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 3 - 15
  • [39] Security Evaluation of Passwords Used on Internet
    Hub, Miloslav
    Capek, Jan
    [J]. JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2011, 5 (03) : 437 - 450
  • [40] Rethinking Passwords
    Cheswick, William
    [J]. COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 40 - 44