Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Balagani, Kiran S.a | Gasti, Paoloa; * | Elliott, Aaronb | Richardson, Azrielc | O’Neal, Mikec
Affiliations: [a] Department of Computer Science, New York Institute of Technology, NY, USA. E-mails: kbalagan@nyit.edu, pgasti@nyit.edu | [b] Aegis Research Lab, LLC, LA, USA. E-mail: aaron@aegisresearchlabs.com | [c] Department of Computer Science, Louisiana Tech University, LA, USA. E-mails: azriel_richardson@yahoo.com, mike@coes.latech.edu
Correspondence: [*] Corresponding author. E-mail: pgasti@nyit.edu.
Abstract: In this paper, we show that keystroke latencies used in continuous user authentication systems disclose application context, i.e., in which application user is entering text. Using keystroke data collected from 62 subjects, we show that an adversary can infer application context from keystroke latencies with 95.15% accuracy. To prevent leakage from keystroke latencies, and prevent exposure of application context, we develop privacy-preserving authentication protocols in the outsourced authentication model. Our protocols implement two popular matching algorithms designed for keystroke authentication, called Absolute (“A”) and Relative (“R”). With our protocols, the client reveals no information to the server during authentication, besides the authentication result. Our experiments show that these protocols are fast in practice: with 100 keystroke features, authentication was completed in about one second with the “A” protocol, and in 595 ms with the “R” protocol. Further, because the asymptotic cost of our protocols is linear, they can scale to a large number of features. On the other hand, by leveraging application context we were able to reduce HTER from 14.7% with application-agnostic templates, to as low as 5.8% with application-specific templates.
Keywords: Biometrics, keystroke authentication, privacy, privacy-preserving protocols, application context
DOI: 10.3233/JCS-171017
Journal: Journal of Computer Security, vol. 26, no. 4, pp. 543-556, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl