A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics

The majority of authentication systems used today involves passwords, where a user is required to remember and key in the correct password to login. Keystroke biometrics is an alternative approach whereby users are identified by one or more features such as (a) the timing between keystrokes, (b) how...

Full description

Saved in:
Bibliographic Details
Main Author: TEY, Chee Meng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/etd_coll/98
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1097&context=etd_coll
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.etd_coll-1097
record_format dspace
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic imitation
collection
usability
keystroke
biometrics
dynamics
Information Security
spellingShingle imitation
collection
usability
keystroke
biometrics
dynamics
Information Security
TEY, Chee Meng
A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
description The majority of authentication systems used today involves passwords, where a user is required to remember and key in the correct password to login. Keystroke biometrics is an alternative approach whereby users are identified by one or more features such as (a) the timing between keystrokes, (b) how long users hold each key and (c) how hard users press each key. It is being assumed in prior research that the way one user types a password/word is different from the way another user types the same password and this characteristic remains stable over time. Existing literature however left open three questions that are material to the security and usability of keystroke biometrics. The first concerns the uniqueness property. Keystroke biometrics is a form of behaviour biometrics. Behaviour can be conditioned by training. An important question is whether one person’s typing pattern can be changed, through appropriate training to resemble that of another if the typing pattern of the latter is known. If the answer is positive, the false acceptance rate of keystroke biometrics would increase to unacceptable levels. A natural second question which follows from the first, questions the extent to which typing patterns can be kept secret. Attackers who are able to log the keystrokes can create a model of the victim’s typing pattern. We ask whether there exists more convenient and less intrusive ways to collect typing patterns. The availability of typing pattern raise both security and privacy concerns because it is a prerequisite for (a) achieving the best outcome in timing side channel attacks and (b) imitation attacks on keystroke biometrics. It can also be used to identify users. The last question concerns the stability of typing patterns. Given that the environment, as well as the physical and mental conditions of users changes throughout the day, we ask whether collected typing patterns remain stable under different conditions. For example, to what extent do the typing patterns change with the mood, muscle strain such as after exercise, posture, type of keyboard and even lighting? If typing patterns are not resistant to these conditions, it may result in a higher false rejection rate (FRR). High FRR leads to usability problems. Usability issues are an important aspect of security, because poor usability motivates users to find shortcuts that bypass the system. It also creates a pressure to tune the system in ways that lower security. In this thesis, we answer all three questions. We found that by providing a novel feedback and training interface, it is possible for one person to imitate another through incremental adjustment of typing pattern. We show that even for targets whose typing patterns are only partially known, imitation training allows attackers to defeat one of the best anomaly detection engines using keystroke biometrics. For a group of 84 participants playing the role of attackers and 2 eight-character passwords of different difficulty, the false acceptance rate (FAR) of the easy and difficult password increases from 0.24 and 0.20 respectively before training, to 0.63 and 0.42 respectively after training. With full information, the FAR increases to 0.99 for both passwords for the 14 best attackers. To explore the feasibility of collecting typing patterns, we focus on interactivity rich JavaScript applications. The Google Suggestions service used in Google Search is one example of an interactivity rich JavaScript application. We analysed the timing side channel of Google Suggestions by reverse engineering the communication model from obfuscated JavaScript code. The goal is to determine the extent to which an attacker can infer the typing pattern of a victim. From our experiments involving 11 participants, we found that for each keypair with at least 20 samples, the mean of the inter-keystroke timing can be determined with an error of less than 20%. For the usability problem, we show that the FRR of keystroke biometrics changes for the worse under a range of common conditions such as background music, exercise and even game playing. In a user study involving 111 participants, the average penalties (increases) in FRR are 0.0360 and 0.0498, respectively, for two different classifiers. We also show that not everyone is suitable for keystroke biometrics deployment, which is exacerbated by the susceptibility to external influences. For example, using a Monte Carlo simulation, we found that 30% of users would encounter an account lockout before their 50th authentication session (for a lockout policy of 3 attempts) if they are affected by external influences 50% of the time when authenticating.
format text
author TEY, Chee Meng
author_facet TEY, Chee Meng
author_sort TEY, Chee Meng
title A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
title_short A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
title_full A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
title_fullStr A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
title_full_unstemmed A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
title_sort study of the imitation, collection and usability issues of keystroke biometrics
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/etd_coll/98
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1097&context=etd_coll
_version_ 1712300858524303360
spelling sg-smu-ink.etd_coll-10972015-08-27T08:29:28Z A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics TEY, Chee Meng The majority of authentication systems used today involves passwords, where a user is required to remember and key in the correct password to login. Keystroke biometrics is an alternative approach whereby users are identified by one or more features such as (a) the timing between keystrokes, (b) how long users hold each key and (c) how hard users press each key. It is being assumed in prior research that the way one user types a password/word is different from the way another user types the same password and this characteristic remains stable over time. Existing literature however left open three questions that are material to the security and usability of keystroke biometrics. The first concerns the uniqueness property. Keystroke biometrics is a form of behaviour biometrics. Behaviour can be conditioned by training. An important question is whether one person’s typing pattern can be changed, through appropriate training to resemble that of another if the typing pattern of the latter is known. If the answer is positive, the false acceptance rate of keystroke biometrics would increase to unacceptable levels. A natural second question which follows from the first, questions the extent to which typing patterns can be kept secret. Attackers who are able to log the keystrokes can create a model of the victim’s typing pattern. We ask whether there exists more convenient and less intrusive ways to collect typing patterns. The availability of typing pattern raise both security and privacy concerns because it is a prerequisite for (a) achieving the best outcome in timing side channel attacks and (b) imitation attacks on keystroke biometrics. It can also be used to identify users. The last question concerns the stability of typing patterns. Given that the environment, as well as the physical and mental conditions of users changes throughout the day, we ask whether collected typing patterns remain stable under different conditions. For example, to what extent do the typing patterns change with the mood, muscle strain such as after exercise, posture, type of keyboard and even lighting? If typing patterns are not resistant to these conditions, it may result in a higher false rejection rate (FRR). High FRR leads to usability problems. Usability issues are an important aspect of security, because poor usability motivates users to find shortcuts that bypass the system. It also creates a pressure to tune the system in ways that lower security. In this thesis, we answer all three questions. We found that by providing a novel feedback and training interface, it is possible for one person to imitate another through incremental adjustment of typing pattern. We show that even for targets whose typing patterns are only partially known, imitation training allows attackers to defeat one of the best anomaly detection engines using keystroke biometrics. For a group of 84 participants playing the role of attackers and 2 eight-character passwords of different difficulty, the false acceptance rate (FAR) of the easy and difficult password increases from 0.24 and 0.20 respectively before training, to 0.63 and 0.42 respectively after training. With full information, the FAR increases to 0.99 for both passwords for the 14 best attackers. To explore the feasibility of collecting typing patterns, we focus on interactivity rich JavaScript applications. The Google Suggestions service used in Google Search is one example of an interactivity rich JavaScript application. We analysed the timing side channel of Google Suggestions by reverse engineering the communication model from obfuscated JavaScript code. The goal is to determine the extent to which an attacker can infer the typing pattern of a victim. From our experiments involving 11 participants, we found that for each keypair with at least 20 samples, the mean of the inter-keystroke timing can be determined with an error of less than 20%. For the usability problem, we show that the FRR of keystroke biometrics changes for the worse under a range of common conditions such as background music, exercise and even game playing. In a user study involving 111 participants, the average penalties (increases) in FRR are 0.0360 and 0.0498, respectively, for two different classifiers. We also show that not everyone is suitable for keystroke biometrics deployment, which is exacerbated by the susceptibility to external influences. For example, using a Monte Carlo simulation, we found that 30% of users would encounter an account lockout before their 50th authentication session (for a lockout policy of 3 attempts) if they are affected by external influences 50% of the time when authenticating. 2013-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/etd_coll/98 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1097&context=etd_coll http://creativecommons.org/licenses/by-nc-nd/4.0/ Dissertations and Theses Collection (Open Access) eng Institutional Knowledge at Singapore Management University imitation collection usability keystroke biometrics dynamics Information Security