Empirical keystroke analysis in passwords

被引:0
|
作者
Montalvao, Jugurta [1 ]
Freire, Eduardo O. [1 ]
Bezerra, Murilo A., Jr. [1 ]
Garcia, Rodolfo [2 ]
机构
[1] Univ Fed Sergipe, Dept Elect Engn, Ave Marechal Rondon S-N, Sao Cristovao, SE, Brazil
[2] Sistemas com Inteligencia Artificial, Aracaju, Brazil
关键词
Biometrics; keystroke; password; AUTHENTICATION;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Rhythmic patterns in passwords are addressed as a kind of biometrics. Experimental results are obtained through two publicly available databases. A preprocessing step (time interval equalization) is applied to both down-down keystroke latency and key hold-down time. Improvements from this preprocessing step are shown through experiments intentionally adapted from papers by the owners of both databases. Afterwards our main experiments are guided by questions Q1: How long does it take for a typist to develop a proper timing signature associated to a new meaningless password? And Q2: How does the number of symbols affect biometric performance? Measurements show that for the password .tie5Roanl typists need many dozens of repetitions to stabilize their typing rhythm. As for question Q2, experimental results show better performance for the shorter password try4-mbs, and that even for longest one studied, .tie5Roanl, there is room for performance improvement.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 50 条
  • [11] The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
    Wang, Chun
    Jan, Steve T. K.
    Hu, Hang
    Bossart, Douglas
    Wang, Gang
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 196 - 203
  • [12] Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication
    Hwang, Seong-seob
    Lee, Hyoung-joo
    Cho, Sungzoon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 73 - 78
  • [13] QUESTION-AND-ANSWER PASSWORDS - AN EMPIRICAL-EVALUATION
    HAGA, WJ
    ZVIRAN, M
    INFORMATION SYSTEMS, 1991, 16 (03) : 335 - 343
  • [14] An Empirical Study of Programming Performance Based on Keystroke Characteristics
    Liu, Dapeng
    Xu, Shaochun
    COMPUTER AND INFORMATION SCIENCE 2011, 2011, 364 : 59 - +
  • [15] Evaluating Programming Performance with Keystroke Characteristics: An Empirical Experiment
    Liu, Huafu
    Liu, Dapeng
    Xu, Shaochun
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 329 - 335
  • [16] The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units
    Chen, Chia-Mei
    Chang, Tien-Ho
    Lai, Gu-Hsin
    2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 115 - 120
  • [17] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [18] An Analysis of Persuasive Text Passwords
    Thi Thu Trang Nguyen
    Quang Uy Nguyen
    PROCEEDINGS OF 2015 2ND NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT CONFERENCE ON INFORMATION AND COMPUTER SCIENCE NICS 2015, 2015, : 28 - 33
  • [19] Empirical study on lexical sentiment in passwords from Chinese websites
    Zeng, Jianping
    Duan, Jiangjiao
    Wu, Chengrong
    COMPUTERS & SECURITY, 2019, 80 : 200 - 210
  • [20] Pattern classification methods for keystroke analysis
    Cho, Tai-Hoon
    2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 1938 - 1941