Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings

Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and i...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU, Ximming, LI, Yingjiu, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4211
https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5214
record_format dspace
spelling sg-smu-ink.sis_research-52142018-12-27T09:42:39Z Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings LIU, Ximming LI, Yingjiu DENG, Robert H. Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and incur high costs in deployments or operations. Recent 2FA mechanisms such as Sound-Proof, reduce or eliminate users' interactions for the proof of the second factor; however, they are not designed to be used in certain settings (e.g., quiet environments or PCs without built-in microphones), and they are not secure in the presence of certain attacks (e.g., sound-danger attack and co-located attack).To address these problems, we propose Typing-Proof, a usable, secure and low-cost two-factor authentication mechanism. Typing-Proof is similar to software token based 2FA in a sense that it uses password as the first factor and uses a registered phone to prove the second factor. During the second-factor authentication procedure, it requires a user to type any random code on a login computer and authenticates the user by comparing the keystroke timing sequence of the random code recorded by the login computer with the sounds of typing random code recorded by the user's registered phone. Typing-Proof can be reliably used in any settings and requires zero user-phone interaction in the most cases. It is practically secure and immune to the existing attacks to recent 2FA mechanisms. In addition, Typing-Proof enables significant cost savings for both service providers and users. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4211 info:doi/10.1145/3274694.3274699 https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
LIU, Ximming
LI, Yingjiu
DENG, Robert H.
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
description Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and incur high costs in deployments or operations. Recent 2FA mechanisms such as Sound-Proof, reduce or eliminate users' interactions for the proof of the second factor; however, they are not designed to be used in certain settings (e.g., quiet environments or PCs without built-in microphones), and they are not secure in the presence of certain attacks (e.g., sound-danger attack and co-located attack).To address these problems, we propose Typing-Proof, a usable, secure and low-cost two-factor authentication mechanism. Typing-Proof is similar to software token based 2FA in a sense that it uses password as the first factor and uses a registered phone to prove the second factor. During the second-factor authentication procedure, it requires a user to type any random code on a login computer and authenticates the user by comparing the keystroke timing sequence of the random code recorded by the login computer with the sounds of typing random code recorded by the user's registered phone. Typing-Proof can be reliably used in any settings and requires zero user-phone interaction in the most cases. It is practically secure and immune to the existing attacks to recent 2FA mechanisms. In addition, Typing-Proof enables significant cost savings for both service providers and users.
format text
author LIU, Ximming
LI, Yingjiu
DENG, Robert H.
author_facet LIU, Ximming
LI, Yingjiu
DENG, Robert H.
author_sort LIU, Ximming
title Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
title_short Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
title_full Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
title_fullStr Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
title_full_unstemmed Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
title_sort typing-proof: usable, secure and low-cost two-factor authentication based on keystroke timings
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/4211
https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf
_version_ 1770574467600220160