Proceedings of the 15th Koli Calling Conference on Computing Education Research 2015
DOI: 10.1145/2828959.2828960
|View full text |Cite
|
Sign up to set email alerts
|

Identification of programmers from typing patterns

Abstract: Being able to identify the user of a computer solely based on their typing patterns can lead to improvements in plagiarism detection, provide new opportunities for authentication, and enable novel guidance methods in tutoring systems. However, at the same time, if such identification is possible, new privacy and ethical concerns arise. In our work, we explore methods for identifying individuals from typing data captured by a programming environment as these individuals are learning to program. We compare the i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
54
0
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 35 publications
(60 citation statements)
references
References 33 publications
2
54
0
4
Order By: Relevance
“…For example, source code files can include identifying information in comments, and the identifiers in the program code (student invented names of variables and data types) can contain information that may destroy the anonymity of the data set. Moreover, even the time between key presses can be used to distinguish between students [76]. All these aspects should be taken care of when data sets are prepared for publicity.…”
Section: Privacymentioning
confidence: 99%
“…For example, source code files can include identifying information in comments, and the identifiers in the program code (student invented names of variables and data types) can contain information that may destroy the anonymity of the data set. Moreover, even the time between key presses can be used to distinguish between students [76]. All these aspects should be taken care of when data sets are prepared for publicity.…”
Section: Privacymentioning
confidence: 99%
“…Não foram encontrados trabalhos que abordem a utilização da dinâmica codificação para a autenticação contínua de alunos em ambientes de juiz on-line. Entretanto, o estudo de [Longi et al 2015] mostra que os alunos podem ser autenticados ou identificados através destas características em atividades das disciplinas de programação. Nesse estudo, os autores estudaram o quanto a quantidade dos dados afeta a precisão da identificação dos alunos.…”
Section: Trabalhos Relacionadosunclassified
“…Indeed, they note that while many better coders type fast, some poor coders also exhibited a rapid keystroke frequency. Longi et al (2015) also use keystroke metrics so solve a slightly different problem, that of identifying a programmer from their keystroke timings. The authors used a number of approaches, with the most complex being to build a profile of the digraph timings for each programmer.…”
Section: Prior Workmentioning
confidence: 99%
“…For example, during coding sessions, students are encouraged to interrupt their typing to sketch out ideas or to consult notes. Similar to the approach taken by Dowland and Furnell (2004) and Longi et al (2015), a data pre-processing stage was applied to address these outliers. An upper bound of 2 seconds on the digraphs was applied, eliminating all digraphs with latencies greater than this.…”
Section: Utilizing Keystroke Datamentioning
confidence: 99%