Spoofing key-press latencies with a generative keystroke dynamics - - PowerPoint PPT Presentation

spoofing key press latencies with a generative keystroke
SMART_READER_LITE
LIVE PREVIEW

Spoofing key-press latencies with a generative keystroke dynamics - - PowerPoint PPT Presentation

Introduction Methodology Experimental results Conclusions Spoofing key-press latencies with a generative keystroke dynamics model John V. Monaco Md Liakat Ali Charles C. Tappert Pace University, NY September 11, 2015 John V. Monaco Md


slide-1
SLIDE 1

Introduction Methodology Experimental results Conclusions

Spoofing key-press latencies with a generative keystroke dynamics model

John V. Monaco Md Liakat Ali Charles C. Tappert

Pace University, NY

September 11, 2015

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-2
SLIDE 2

Introduction Methodology Experimental results Conclusions

Outline

1

Introduction

2

Methodology

3

Experimental results

4

Conclusions

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-3
SLIDE 3

Introduction Methodology Experimental results Conclusions

Scenario.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-4
SLIDE 4

Introduction Methodology Experimental results Conclusions

Typing behavior.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-5
SLIDE 5

Introduction Methodology Experimental results Conclusions

Predicted key-press latency distributions.

Buffer delays Motor delays

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-6
SLIDE 6

Introduction Methodology Experimental results Conclusions

Two-state hidden Markov model.

8 parameter model almost perfectly reproduces the empirical distribution of key-press latencies for every user

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-7
SLIDE 7

Introduction Methodology Experimental results Conclusions

Empirical and model CDF.

Empirical CDF (solid blue) and model CDF (dashed black) for 2 users

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-8
SLIDE 8

Introduction Methodology Experimental results Conclusions

Goodness of fit test.

Empirical Model Empirical Sample Surrogate Model Surrogate Sample Surrogate Model Surrogate Sample Surrogate Model Surrogate Sample

P(|A s−⟨ As⟩|>|A−⟨ As⟩|) A

A s

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-9
SLIDE 9

Introduction Methodology Experimental results Conclusions

Goodness of fit test results.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-10
SLIDE 10

Introduction Methodology Experimental results Conclusions

Keyboard coordinates.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-11
SLIDE 11

Introduction Methodology Experimental results Conclusions

Scaling between latency and distance.

Log key-press latency vs. inter-key distance for fast and slow typists

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-12
SLIDE 12

Introduction Methodology Experimental results Conclusions

Latency-distance slope vs. typing speed.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-13
SLIDE 13

Introduction Methodology Experimental results Conclusions

Spoofing procedure.

Observe key-press latencies with missing key names Determine which latencies correspond to an active typing state using a 2-state HMM Use the latency inter-key distance scaling behavior to generate latencies for a predefined text

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-14
SLIDE 14

Introduction Methodology Experimental results Conclusions

Recover the victim’s typing behavior.

Solve a system of equations to recover the expected key-press latencies for each unique inter-key distance in the predefined text µδi − µδj = Cµ δi −δj σδi −σδj = Cσ δi −δj µs = µ1 = ∑wδ µδ σ2

s = σ2 1 = ∑wδ((µδ − µ1)2 +σ2 δ )

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-15
SLIDE 15

Introduction Methodology Experimental results Conclusions

Empirical data.

129 users, 4 samples each

751±94 keystrokes per sample

Key-press latency τi = ti −ti−1 (1)

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-16
SLIDE 16

Introduction Methodology Experimental results Conclusions

Experiment protocol.

Use the dichotomy classifier with key-press latency features Obtain zero-effort results in the usual way (authenticating every combination of users) Obtain spoofed results by observing the latencies with missing key names and generating a sample for the predefined text Stratified 4-fold cross validation

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-17
SLIDE 17

Introduction Methodology Experimental results Conclusions

ROC curves for zero-effort and spoofed attacks.

Zero-effort: 7.5% EER Spoofed: 12.9% EER

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-18
SLIDE 18

Introduction Methodology Experimental results Conclusions

Relative increase in error over zero-effort.

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-19
SLIDE 19

Introduction Methodology Experimental results Conclusions

Summary.

With at least 50 observed keystrokes, the chance of success

  • ver a zero-effort attack doubles on average

Worth exploring further?

Yes

Next steps?

Model key-release times

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics

slide-20
SLIDE 20

Introduction Methodology Experimental results Conclusions

Thank you.

Thank you

John V. Monaco Md Liakat Ali Charles C. Tappert Spoofing key-press latencies with a generative keystroke dynamics