Content Reconstruction Using Keystroke Dynamics: Preliminary Results

Keystroke dynamics is a technique used to verify the identity of a person, by investigating the way a person types on a keyboard. This can be used for example in combination with a password to get access to a computer system. In that case not only the correctness of the password is checked, but also if the manner in which it was typed is correct. This is because the typing rhythm of a person is fairly unique. In this research we investigated the possibility to reconstruct the content of the typed text from the keystroke dynamics typing data. We will show that under highly optimal conditions, a simple English sentence could be reconstructed from timing information only. These results indicate however that under ordinary circumstances, at this moment, it is not likely that an attacker can reconstruct a random text from the keystroke dynamics data. However this is a preliminary study and the specific techniques used in the method we employed can be optimized, which might result in a different conclusion. Our results indicate that an attacker can train the system by using his own keystroke data or similar data of a set of accomplices.

[1]  Ana Carolina Lorena,et al.  Evolutionary neural networks applied to keystroke dynamics: Genetic and immune based , 2012, 2012 IEEE Congress on Evolutionary Computation.

[2]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[3]  Sungzoon Cho,et al.  Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication , 2009, Expert Syst. Appl..

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[5]  Lai Weng Kin,et al.  Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[6]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[7]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[8]  Christophe Rosenberger,et al.  A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..

[9]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[10]  Jiankun Hu,et al.  A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics , 2008, 2008 IEEE International Conference on Communications.

[11]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[12]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[13]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[14]  Pingzhi Fan,et al.  Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine , 2004, PDCAT.

[15]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[16]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.