2014 IEEE 15th International Symposium on High-Assurance Systems Engineering 2014
DOI: 10.1109/hase.2014.11
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…If the imposter wants to break a system, his choice can be limited in either forcing the genuine user to type it or emulating the genuine user's typing by practice. Therefore, there is still a considerable amount of researchers performing behavior-based research because they believe that keystroke dynamics can improve the security and it will be a common approach to be used in the future [2][3][4][5][6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the imposter wants to break a system, his choice can be limited in either forcing the genuine user to type it or emulating the genuine user's typing by practice. Therefore, there is still a considerable amount of researchers performing behavior-based research because they believe that keystroke dynamics can improve the security and it will be a common approach to be used in the future [2][3][4][5][6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…The timing detail means the duration between pressing a key and releasing a key or vice versa. Keystroke dynamics can be applied with the machine learning to discover knowledge about people's typing behavior [8], emotion [12], gender [3], dominant hand [4], and so forth. In this paper, we associate the typing behavior with the authentication system.…”
Section: Introductionmentioning
confidence: 99%
“…Free text, on the other hand, is involved in continuous authentication that prevents the attacker from presenting an authorized user in an ongoing session (Syed, Banerjee, & Cukic, 2014;Zhong, Deng, & Jain, 2012). (Syed et al, 2014) have used the variations in typing sequence as distinctive features in their authentication system. A new distance metric has been suggested and used in (Zhong et al, 2012) for keystroke based authentication systems.…”
Section: ) Hand Gesturesmentioning
confidence: 99%
“…Syed et al [97] extracted features using variations in keying event, motivated by the observation that the same text string may be inputted using different key entry sequences. They found out that such variations in typing sequences contain distinguishing information for user authentication, while being independent of typing proficiency.…”
Section: Keystroke Dynamics Featuresmentioning
confidence: 99%