메뉴 건너뛰기




Volumn 31, Issue 1, 2012, Pages 109-121

Robustness of keystroke-dynamics based biometrics against synthetic forgeries

Author keywords

Attack; Authentication; Bot; Classification; Forgery; Keystroke dynamics; Malware detection

Indexed keywords

ATTACK; BOT; FORGERY; KEYSTROKE DYNAMICS; MALWARE DETECTION;

EID: 84855983623     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.10.001     Document Type: Conference Paper
Times cited : (53)

References (29)
  • 6
    • 34147151570 scopus 로고    scopus 로고
    • J. Ilonen Keystroke dynamics 2003 http://www2.it.lut.fi/kurssit/03-04/ 010970000/seminars/Ilonen.pdf
    • (2003) Keystroke Dynamics
    • Ilonen, J.1
  • 7
    • 0000545946 scopus 로고    scopus 로고
    • Improvements to Platt's SMO algorithm for SVM classifier design
    • DOI 10.1162/089976601300014493
    • S. Keerthi, S. Shevade, C. Bhattacharyya, and K. Murthy Improvements to platt's smo algorithm for SVM classifier design Neural Computation 13 3 2001 637 649 (Pubitemid 33595014)
    • (2001) Neural Computation , vol.13 , Issue.3 , pp. 637-649
    • Keerthi, S.S.1    Shevade, S.K.2    Bhattacharyya, C.3    Murthy, K.R.K.4
  • 8
    • 84856023177 scopus 로고    scopus 로고
    • Lkl linux keylogger, http://sourceforge.net/projects/lkl/; 2001.
    • (2001) Lkl Linux Keylogger
  • 9
    • 84856018754 scopus 로고    scopus 로고
    • Kernel Based Keylogger
    • Kernel Based Keylogger. http://packetstormsecurity.org/UNIX/security/; 2001.
    • (2001)
  • 10
    • 56549092419 scopus 로고    scopus 로고
    • The effect of clock resolution on keystroke dynamics
    • R. Lippmann, E. Kirda, A. Trachtenberg, Lecture notes in computer science Springer
    • K.S. Killourhy, and R.A. Maxion The effect of clock resolution on keystroke dynamics R. Lippmann, E. Kirda, A. Trachtenberg, RAID Lecture notes in computer science vol. 5230 2008 Springer 331 350
    • (2008) RAID , vol.5230 , pp. 331-350
    • Killourhy, K.S.1    Maxion, R.A.2
  • 11
    • 78249240878 scopus 로고    scopus 로고
    • Why did my detector do that?! predicting keystroke-dynamics error rates
    • Lecture notes in computer science
    • K. Killourhy, and R. Maxion Why did my detector do that?! predicting keystroke-dynamics error rates Proceedings of the Recent Advances in Intrusion detection (RAID) Lecture notes in computer science vol. 6307 2010 256 276
    • (2010) Proceedings of the Recent Advances in Intrusion Detection (RAID) , vol.6307 , pp. 256-276
    • Killourhy, K.1    Maxion, R.2
  • 12
    • 84856019327 scopus 로고    scopus 로고
    • rd, writing linux kernel keylogger
    • rd, writing linux kernel keylogger, Phrack Magazine 12(14), http://freeworld.thc.org/papers/writing-linux-kernel-keylogger.txt; 2001.
    • (2001) Phrack Magazine , vol.12 , Issue.14
  • 13
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • DOI 10.1016/S0167-739X(99)00059-X
    • F. Monrose, and A. Rubin Keystroke dynamics as a biometric for authentication Future Generation Computer Systems 16 4 2000 351 359 (Pubitemid 30552905)
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 15
    • 78249243406 scopus 로고    scopus 로고
    • Bait your hook: A novel detection technique for keyloggers
    • S. Jha, R. Sommer, C. Kreibich, Lecture notes in computer science Springer
    • S. Ortolani, C. Giuffrida, and B. Crispo Bait your hook: a novel detection technique for keyloggers S. Jha, R. Sommer, C. Kreibich, RAID Lecture notes in computer science vol. 6307 2010 Springer 198 217
    • (2010) RAID , vol.6307 , pp. 198-217
    • Ortolani, S.1    Giuffrida, C.2    Crispo, B.3
  • 17
    • 0003120218 scopus 로고    scopus 로고
    • Fast training of support vector machines using sequential minimal optimization
    • Ch. 12
    • Platt J, Fast training of support vector machines using sequential minimal optimization, in: Advances in kernel methods - support vector learning, 1998, Ch. 12.
    • (1998) Advances in Kernel Methods - Support Vector Learning
    • Platt, J.1
  • 19
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • USENIX
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn Design and implementation of a TCG-based integrity measurement architecture USENIX security symposium 2004 USENIX 223 238
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 20
    • 77950555884 scopus 로고    scopus 로고
    • The user is not the enemy: Fighting malware by tracking user intentions
    • ACM New York, NY, USA
    • J. Shirley, and D. Evans The user is not the enemy: fighting malware by tracking user intentions NSPW '08: proceedings of the 2008 workshop on new security paradigms 2008 ACM New York, NY, USA 33 45 http://doi.acm.org/10.1145/ 1595676.1595683
    • (2008) NSPW '08: Proceedings of the 2008 Workshop on New Security Paradigms , pp. 33-45
    • Shirley, J.1    Evans, D.2
  • 23
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • L. von Ahn, M. Blum, and J. Langford Telling humans and computers apart automatically Communications of the ACM 47 2 2004 56 60
    • (2004) Communications of the ACM , vol.47 , Issue.2 , pp. 56-60
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 29
    • 79959957319 scopus 로고    scopus 로고
    • Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • Zhang K, Wang X. Peeping Tom in the neighborhood: keystroke eavesdropping on multi-user systems, in: proceedings of the USENIX security symposium, 2009.
    • (2009) Proceedings of the USENIX Security Symposium
    • Zhang, K.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.