Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and i...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4211 https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5214 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-52142018-12-27T09:42:39Z Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings LIU, Ximming LI, Yingjiu DENG, Robert H. Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and incur high costs in deployments or operations. Recent 2FA mechanisms such as Sound-Proof, reduce or eliminate users' interactions for the proof of the second factor; however, they are not designed to be used in certain settings (e.g., quiet environments or PCs without built-in microphones), and they are not secure in the presence of certain attacks (e.g., sound-danger attack and co-located attack).To address these problems, we propose Typing-Proof, a usable, secure and low-cost two-factor authentication mechanism. Typing-Proof is similar to software token based 2FA in a sense that it uses password as the first factor and uses a registered phone to prove the second factor. During the second-factor authentication procedure, it requires a user to type any random code on a login computer and authenticates the user by comparing the keystroke timing sequence of the random code recorded by the login computer with the sounds of typing random code recorded by the user's registered phone. Typing-Proof can be reliably used in any settings and requires zero user-phone interaction in the most cases. It is practically secure and immune to the existing attacks to recent 2FA mechanisms. In addition, Typing-Proof enables significant cost savings for both service providers and users. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4211 info:doi/10.1145/3274694.3274699 https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security |
spellingShingle |
Information Security LIU, Ximming LI, Yingjiu DENG, Robert H. Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
description |
Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and incur high costs in deployments or operations. Recent 2FA mechanisms such as Sound-Proof, reduce or eliminate users' interactions for the proof of the second factor; however, they are not designed to be used in certain settings (e.g., quiet environments or PCs without built-in microphones), and they are not secure in the presence of certain attacks (e.g., sound-danger attack and co-located attack).To address these problems, we propose Typing-Proof, a usable, secure and low-cost two-factor authentication mechanism. Typing-Proof is similar to software token based 2FA in a sense that it uses password as the first factor and uses a registered phone to prove the second factor. During the second-factor authentication procedure, it requires a user to type any random code on a login computer and authenticates the user by comparing the keystroke timing sequence of the random code recorded by the login computer with the sounds of typing random code recorded by the user's registered phone. Typing-Proof can be reliably used in any settings and requires zero user-phone interaction in the most cases. It is practically secure and immune to the existing attacks to recent 2FA mechanisms. In addition, Typing-Proof enables significant cost savings for both service providers and users. |
format |
text |
author |
LIU, Ximming LI, Yingjiu DENG, Robert H. |
author_facet |
LIU, Ximming LI, Yingjiu DENG, Robert H. |
author_sort |
LIU, Ximming |
title |
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
title_short |
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
title_full |
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
title_fullStr |
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
title_full_unstemmed |
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings |
title_sort |
typing-proof: usable, secure and low-cost two-factor authentication based on keystroke timings |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/4211 https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf |
_version_ |
1770574467600220160 |