“…Mechanisms capable of complementing the traditional authentication procedures, which are based on knowledge of a certain password or possession of a certain cryptographic key, would be highly desirable. Approaches which have been proposed in this respect include usage of the stream of events generated at the human-machine boundary as a "behavioral biometric" property which can be univocally associated with each user-keystrokes [5], [6], mouse trajectories and clicks [7], [8], [9], [10], [11], [12], [6], touch-screen interactions [13]. By comparing the stream of events in a certain session to a previously collected ground truth, one may perform additional authentication checks with high accuracy.…”