메뉴 건너뛰기




Volumn , Issue , 2011, Pages 51-59

Using global knowledge of users' typing traits to attack keystroke biometrics templates

Author keywords

biometrics; keystroke dynamics

Indexed keywords

GENERAL KNOWLEDGE; GLOBAL KNOWLEDGE; KEYSTROKE DYNAMICS; MALWARES; PASSWORD-BASED SYSTEMS; STRONG PASSWORD;

EID: 80054784859     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2037252.2037263     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 2
    • 79952697017 scopus 로고    scopus 로고
    • On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
    • Feb.
    • K. S. Balagani, V. V. Phoha, A. Ray, and S. Phoha. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters, Feb. 2011.
    • (2011) Pattern Recognition Letters
    • Balagani, K.S.1    Phoha, V.V.2    Ray, A.3    Phoha, S.4
  • 6
    • 56049086396 scopus 로고    scopus 로고
    • Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews
    • D. Hosseinzadeh and S. Krishnan. Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 38(6):816-826, 2008.
    • (2008) IEEE Transactions on , vol.38 , Issue.6 , pp. 816-826
    • Hosseinzadeh, D.1    Krishnan, S.2
  • 8
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • DOI 10.1145/75577.75582
    • R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33:168-176, February 1990. (Pubitemid 20657223)
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 10
    • 56549092419 scopus 로고    scopus 로고
    • The effect of clock resolution on keystroke dynamics
    • Recent Advances in Intrusion Detection Springer-Verlag
    • K. Killourhy and R. Maxion. The effect of clock resolution on keystroke dynamics. In Recent Advances in Intrusion Detection, volume 5230/2008 of Lecture Notes in Computer Science, pages 331-350. Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5230 , Issue.2008 , pp. 331-350
    • Killourhy, K.1    Maxion, R.2
  • 11
    • 70450014575 scopus 로고    scopus 로고
    • Comparing anomaly-detection algorithms for keystroke dynamics
    • K. S. Killourhy and R. A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In DSN, pages 125-134, 2009.
    • (2009) DSN , pp. 125-134
    • Killourhy, K.S.1    Maxion, R.A.2
  • 17
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • DOI 10.1109/MSP.2004.89
    • A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2:40-47, 2004. (Pubitemid 40168625)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 18
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • March
    • N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 40:614-634, March 2001.
    • (2001) IBM Syst. J. , vol.40 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 20
    • 0022718731 scopus 로고
    • Perceptual, cognitive, and motoric aspects of transcription typing
    • T. A. Salthouse. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin, 99(3):303-319, 1986.
    • (1986) Psychological Bulletin , vol.99 , Issue.3 , pp. 303-319
    • Salthouse, T.A.1
  • 22
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on ssh
    • Berkeley, CA, USA, USENIX Association
    • D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th conference on USENIX Security Symposium - Volume 10, pages 25-25, Berkeley, CA, USA, 2001. USENIX Association.
    • (2001) Proceedings of the 10th Conference on USENIX Security Symposium , vol.10 , pp. 25-25
    • Song, D.X.1    Wagner, D.2    Tian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.