SlideShare a Scribd company logo
MobiCASE 2013
6-7 November, Paris, France
Ben Draffin, Jiang Zhu, Joy Zhang

1


Tablet used for patient data
◦ Sensitive, private information
◦ Designed to be easily accessible



Urgent call from other room
◦ Nurse steps away





Bystander picks up tablet,
writes down patient data,
places it back

Results in identity theft

2


Mobile devices are at high risk of theft



Relatively easy to break into





(Zahid 2009)

After phone’s pin is entered, secondary
authentication is rare
Users may take many minutes to realize their
phones are stolen

3




Provides a way to passively authenticate while
using common, sensitive applications.
Allows for rapid detection of unauthorized
users
◦ Block their access as quickly as possible.



Uses a variety of sensors available on
common smartphones

4


Ask for password at opening of every app
◦ Some don’t need it
◦ Gets annoying



Allow for usage under certain situations (at
work, at home)
◦ Prompt if deviations from normal routine



Rely on prompt calls from affected party
◦ Call up IT department to deactivate phone

◦ What if first thing is to turn on airplane mode?

5


Keystroke Dynamics are a popular subject
◦ Many papers—focusing primarily on desktops







Great success for passwords, good success
for arbitrary text
Typing rate, key-to-key latencies are the
primary features
Once people are skilled at typing, they
develop natural rhythms (on desktops)

6




Detecting keystroke patterns on mobile
phones is challenging
Focus on Desktop-like attributes
◦ Typing rate, timing, di-graphs, tri-graphs, etc.

 Need to leverage wealth of smartphone
features

7


Use background applications to ―sniff‖
keystrokes
◦ Without direct access to keyboard





Successful demonstrations using
accelerometers
Akin to microphone attacks on typing

8


Frequent use
◦ Typically single user



Context awareness
◦ Protected applications vs Non-protected
◦ Current location, historical patterns



Touchscreens provide wealth of data
◦ Touch location, pressure, finger size, finger drift



Wide variety of other sensors
◦ Accelerometers, gyroscopes

9


Limited computing power
◦ Need to use efficient algorithms



Finite battery life
◦ Users are sensitive to battery life impact



Highly mobile
◦ Typical usage: lying
down, sitting, walking, passenger in
car/train/subway system
◦ Need to behave gracefully

10
11




Location pressed on key
Length of press (key down to key up)
Force of press
◦ Also, how force changes over key press







Size of finger
Drift of finger during press
Recent accelerometer history
Orientation (depreciated)

12
13
14


From finger down to finger up

15


Only use data from a single user’s phone
◦ Generative model rather than Discriminative





Respond quickly when unauthorized user
detected, yet avoid false positives
Work in open, unrestricted environments
◦ How to compensate for users sitting or laying down

16


13 initial users after short recruiting drive
2 week long collection period
86,000 keystrokes
430,000 data points @ ~5/keystroke



Data split into training and testing:





Training Data for Model
50%

CV
15%

Training
for Keys

15%

CV for
Keys

10%

Final
Testing

15%

17
18
19
Intrusion Detection Rate: 67.7%
FAR:32.3%
FRR:4.6%

20
Intrustion Detection Rate:84.8%
FAR: 15.2%
FRR: 2.2%

21


Some users are harder to differentiate than
others
◦ Gaps between ROC curves
◦ Could use more investigation



Pretty good success in the absence of any
contextual information.
◦ Continuing work on incorporating meta-data
◦ With contextual knowledge, accuracy increases

22








Addresses: How to block
unauthorized users from
protected applications?
Leverages a variety of sensors
(besides just keyboard)
Developed as part of a larger
behavioral analysis program
at Carnegie Mellon Univ.-SV
Led by Joy Zhang and Jiang Zhu
23


Employees' phones
◦ Bring Your Own Device (BYOD)









Delivery persons
IT administrators
Parents with children
Social events
Business travelers
Nurses with mobile devices
for patient records

24
25








Require use of the default Android keyboard
during password or sensitive text entry
Disable sensors while entering text into
password fields
Collaborate with context awareness groups or
side channel attack researchers
Consider research into swiping gestures

26


KeySens
◦ Use keyboard interaction to
detect unauthorized users



SenSec
◦ Leverage keyboard and sensors
to block unauthorized users




Applications
Next Steps

27





CyLab at Carnegie Mellon
Northrop Grumman Cybersecurity Research
Consortium
Cisco
◦ Research award for ―Privacy Preserved Personal Big
Data Analytics through Fog Computing''

Cybersecurity
Research Consortium
28
Passive User Authentication through Microbehavior Modeling of Soft Keyboard Interaction

Thank You
MobiCASE 2013

29














Salil P. Banerjee and Damon L. Woodard. Biometric authentication and identification using
keystroke dynamics: A survey. Journal of Pattern Recognition Research, 2012.
Francesco Bergadano, Daniele Gunetti, and Claudia Picardi. User authentication through
keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367–397, November 2002.
Liang Cai and Hao Chen. On the practicality of motion based keystroke inference attack. In
Stefan Katzenbeisser, Edgar Weippl, L.Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen
Zhang, editors, Trust and Trustworthy Computing, volume 7344 of Lecture Notes in Computer
Science, pages 273–290. Springer Berlin Heidelberg, 2012.
F. Cherifi, B. Hemery, R. Giot, M. Pasquet, and C. Rosenberger. Performance evaluation of
behavioral biometric systems. In Behavioral Biometrics for Human Identication: Intelligent
Applications, pages 57–74. IGI Global, 2010.
Richard O. Duda, Peter E. Hart, and David. G. Stork. Multi-layer neural networks. In Pattern
Classication, 2nd Edition, volume 2. John Wiley and Sons, Inc., 2001.
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. Touchalytics: On the applicability of
touchscreen input as a behavioral biometric for continuous authentication. Information
Forensics and Security, IEEE Transactions on, 8(1):136–148, 2013.
Dawud Gordon, Jrgen Czerny, and Michael Beigl. Activity recognition for creatures of habit.
Personal and Ubiquitous Computing, pages 1–17, 2013.
Paul Holleis, Jussi Huhtala, and Jonna H¨akkil¨a. Studying applications for touch-enabled
mobile phone keypads. In Proceedings of the 2nd international conference on Tangible and
embedded interaction, TEI ’08, pages 15–18, New York, NY, USA, 2008. ACM.
Anil Jain, Lin Hong, and Sharath Pankanti. Biometric identification. Commun. ACM, 43(2):90–
98, February 2000.

30















K.S. Killourhy and R.A. Maxion. Comparing anomaly-detection algorithms for keystroke
dynamics. In Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference
on, pages 125–134, 2009.
Emanuele Maiorana, Patrizio Campisi, Noelia Gonz´alez-Carballo, and Alessandro Neri.
Keystroke dynamics authentication for mobile phones. In Proceedings of the 011 ACM
Symposium on Applied Computing, SAC ’11, pages 21–26, New York, NY, USA, 2011. ACM.
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Accessory: password
inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on
Mobile Computing Systems & Applications, HotMobile ’12, pages 9:1–9:6, New
York, NY, USA, 2012. ACM.
A. Peacock, Xian Ke, and M. Wilkerson. Typing patterns: a key to user identification. Security
Privacy, IEEE, 2(5):40 –47, sept.-oct. 2004.
Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. Implicit authentication through
learning user behavior. In Mike Burmester, Gene Tsudik, Spyros Magliveras, and Ivana
Ili, editors, Information Security, volume 6531 of Lecture Notes in Computer Science, pages
99–113. Springer Berlin Heidelberg, 2011.
Saira Zahid, Muhammad Shahzad, SyedAli Khayam, and Muddassar Farooq. Keystroke-based
user identification on smart phones. In Engin Kirda, Somesh Jha, and Davide
Balzarotti, editors, Recent Advances in Intrusion Detection, volume 5758 of Lecture Notes in
Computer Science, pages 224–243. Springer Berlin Heidelberg, 2009.
Jiang Zhu, Hao Hu, Sky Hu, Pang Wu, and Joy Ying Zhang. Mobile behaviometrics: Models and
applications. In Proceedings of the Second IEEE/CIC Inter- national Conference on
Communications in China (ICCC), Xi’An, China, August 12-14 2013.
Jiang Zhu, Pang Wu, Xiao Wang, Adrian Perrig, Jason Hong, and Joy Ying Zhang. Sensec: Mobile
application security through passive sensing. In Proceedings of International Conference on
Computing, Networking and Communications. (ICNC 2013), San Diego, CA, USA, January 2831 2013.

31

More Related Content

What's hot

Wearable Computing - Part III: The Activity Recognition Chain (ARC)
Wearable Computing - Part III: The Activity Recognition Chain (ARC)Wearable Computing - Part III: The Activity Recognition Chain (ARC)
Wearable Computing - Part III: The Activity Recognition Chain (ARC)
Daniel Roggen
 
Near field communication
Near field communicationNear field communication
Near field communicationDheeraj Raja
 
Wearable technologies: what's brewing in the lab?
Wearable technologies: what's brewing in the lab?Wearable technologies: what's brewing in the lab?
Wearable technologies: what's brewing in the lab?
Daniel Roggen
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
Vineet Garg
 
Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications WSO2
 
It's easy to recognize at any time using an object detection camera - How?
It's easy to recognize at any time using an object detection camera - How?It's easy to recognize at any time using an object detection camera - How?
It's easy to recognize at any time using an object detection camera - How?
HinalModi5
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: Sensors
Daniel Roggen
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
Charith Perera
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
Priyanka Datta
 
Cps innovation lab kolkata iiest
Cps innovation lab kolkata iiestCps innovation lab kolkata iiest
Cps innovation lab kolkata iiest
Arpan Pal
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPT
HRIDHYAJOY
 
Iotweek Iotcrawler Concept Pitches
Iotweek Iotcrawler Concept PitchesIotweek Iotcrawler Concept Pitches
Iotweek Iotcrawler Concept Pitches
IoTCrawler
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
Yury Chemerkin
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
Matteo Ferroni
 
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
Comit Projects Ltd
 

What's hot (17)

Wearable Computing - Part III: The Activity Recognition Chain (ARC)
Wearable Computing - Part III: The Activity Recognition Chain (ARC)Wearable Computing - Part III: The Activity Recognition Chain (ARC)
Wearable Computing - Part III: The Activity Recognition Chain (ARC)
 
Topics
TopicsTopics
Topics
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Wearable technologies: what's brewing in the lab?
Wearable technologies: what's brewing in the lab?Wearable technologies: what's brewing in the lab?
Wearable technologies: what's brewing in the lab?
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications
 
It's easy to recognize at any time using an object detection camera - How?
It's easy to recognize at any time using an object detection camera - How?It's easy to recognize at any time using an object detection camera - How?
It's easy to recognize at any time using an object detection camera - How?
 
Wearable Computing - Part II: Sensors
Wearable Computing - Part II: SensorsWearable Computing - Part II: Sensors
Wearable Computing - Part II: Sensors
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Cps innovation lab kolkata iiest
Cps innovation lab kolkata iiestCps innovation lab kolkata iiest
Cps innovation lab kolkata iiest
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPT
 
Iotweek Iotcrawler Concept Pitches
Iotweek Iotcrawler Concept PitchesIotweek Iotcrawler Concept Pitches
Iotweek Iotcrawler Concept Pitches
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
Sensors, threats, responses and challenges - Dr Emil Lupu (Imperial College L...
 

Viewers also liked

Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
Tushar Kayande
 
#sitFRA - Improving the UX for your users - Where to start?
#sitFRA - Improving the UX for your users - Where to start?#sitFRA - Improving the UX for your users - Where to start?
#sitFRA - Improving the UX for your users - Where to start?
Roel van den Berge
 
Kml and Its Applications
Kml and Its ApplicationsKml and Its Applications
Kml and Its Applications
Ashok Basnet
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
Dan Morrill
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Tool Time: Keystroke Level Modeling
Tool Time: Keystroke Level ModelingTool Time: Keystroke Level Modeling
Tool Time: Keystroke Level Modeling
Michael Rawlins
 
GOMS Analysis on the back of the envelope
GOMS Analysis on the back of the envelopeGOMS Analysis on the back of the envelope
GOMS Analysis on the back of the envelope
AndrewUX
 
How to use the Keystroke-Level Model to compare the efficiency of user interf...
How to use the Keystroke-Level Model to compare the efficiency of user interf...How to use the Keystroke-Level Model to compare the efficiency of user interf...
How to use the Keystroke-Level Model to compare the efficiency of user interf...
World Usability Day - Wrocław
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
Dan Morrill
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...Mina Khidhir
 

Viewers also liked (11)

Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
#sitFRA - Improving the UX for your users - Where to start?
#sitFRA - Improving the UX for your users - Where to start?#sitFRA - Improving the UX for your users - Where to start?
#sitFRA - Improving the UX for your users - Where to start?
 
Kml and Its Applications
Kml and Its ApplicationsKml and Its Applications
Kml and Its Applications
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Tool Time: Keystroke Level Modeling
Tool Time: Keystroke Level ModelingTool Time: Keystroke Level Modeling
Tool Time: Keystroke Level Modeling
 
GOMS Analysis on the back of the envelope
GOMS Analysis on the back of the envelopeGOMS Analysis on the back of the envelope
GOMS Analysis on the back of the envelope
 
How to use the Keystroke-Level Model to compare the efficiency of user interf...
How to use the Keystroke-Level Model to compare the efficiency of user interf...How to use the Keystroke-Level Model to compare the efficiency of user interf...
How to use the Keystroke-Level Model to compare the efficiency of user interf...
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
 

Similar to KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft Keyboard Interaction

Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
IJCI JOURNAL
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
Uvaraj Shan
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
ijtsrd
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses XMovel
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
Josiah Renaudin
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
Rajiv Ranjan Singh
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
Hamed Raza
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
IRJET Journal
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 

Similar to KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft Keyboard Interaction (20)

Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Usabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OSUsabiltyvs Security Case study of SmartPhone OS
Usabiltyvs Security Case study of SmartPhone OS
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft Keyboard Interaction

  • 1. MobiCASE 2013 6-7 November, Paris, France Ben Draffin, Jiang Zhu, Joy Zhang 1
  • 2.  Tablet used for patient data ◦ Sensitive, private information ◦ Designed to be easily accessible  Urgent call from other room ◦ Nurse steps away   Bystander picks up tablet, writes down patient data, places it back Results in identity theft 2
  • 3.  Mobile devices are at high risk of theft  Relatively easy to break into   (Zahid 2009) After phone’s pin is entered, secondary authentication is rare Users may take many minutes to realize their phones are stolen 3
  • 4.   Provides a way to passively authenticate while using common, sensitive applications. Allows for rapid detection of unauthorized users ◦ Block their access as quickly as possible.  Uses a variety of sensors available on common smartphones 4
  • 5.  Ask for password at opening of every app ◦ Some don’t need it ◦ Gets annoying  Allow for usage under certain situations (at work, at home) ◦ Prompt if deviations from normal routine  Rely on prompt calls from affected party ◦ Call up IT department to deactivate phone ◦ What if first thing is to turn on airplane mode? 5
  • 6.  Keystroke Dynamics are a popular subject ◦ Many papers—focusing primarily on desktops    Great success for passwords, good success for arbitrary text Typing rate, key-to-key latencies are the primary features Once people are skilled at typing, they develop natural rhythms (on desktops) 6
  • 7.   Detecting keystroke patterns on mobile phones is challenging Focus on Desktop-like attributes ◦ Typing rate, timing, di-graphs, tri-graphs, etc.  Need to leverage wealth of smartphone features 7
  • 8.  Use background applications to ―sniff‖ keystrokes ◦ Without direct access to keyboard   Successful demonstrations using accelerometers Akin to microphone attacks on typing 8
  • 9.  Frequent use ◦ Typically single user  Context awareness ◦ Protected applications vs Non-protected ◦ Current location, historical patterns  Touchscreens provide wealth of data ◦ Touch location, pressure, finger size, finger drift  Wide variety of other sensors ◦ Accelerometers, gyroscopes 9
  • 10.  Limited computing power ◦ Need to use efficient algorithms  Finite battery life ◦ Users are sensitive to battery life impact  Highly mobile ◦ Typical usage: lying down, sitting, walking, passenger in car/train/subway system ◦ Need to behave gracefully 10
  • 11. 11
  • 12.    Location pressed on key Length of press (key down to key up) Force of press ◦ Also, how force changes over key press     Size of finger Drift of finger during press Recent accelerometer history Orientation (depreciated) 12
  • 13. 13
  • 14. 14
  • 15.  From finger down to finger up 15
  • 16.  Only use data from a single user’s phone ◦ Generative model rather than Discriminative   Respond quickly when unauthorized user detected, yet avoid false positives Work in open, unrestricted environments ◦ How to compensate for users sitting or laying down 16
  • 17.  13 initial users after short recruiting drive 2 week long collection period 86,000 keystrokes 430,000 data points @ ~5/keystroke  Data split into training and testing:    Training Data for Model 50% CV 15% Training for Keys 15% CV for Keys 10% Final Testing 15% 17
  • 18. 18
  • 19. 19
  • 20. Intrusion Detection Rate: 67.7% FAR:32.3% FRR:4.6% 20
  • 22.  Some users are harder to differentiate than others ◦ Gaps between ROC curves ◦ Could use more investigation  Pretty good success in the absence of any contextual information. ◦ Continuing work on incorporating meta-data ◦ With contextual knowledge, accuracy increases 22
  • 23.     Addresses: How to block unauthorized users from protected applications? Leverages a variety of sensors (besides just keyboard) Developed as part of a larger behavioral analysis program at Carnegie Mellon Univ.-SV Led by Joy Zhang and Jiang Zhu 23
  • 24.  Employees' phones ◦ Bring Your Own Device (BYOD)       Delivery persons IT administrators Parents with children Social events Business travelers Nurses with mobile devices for patient records 24
  • 25. 25
  • 26.     Require use of the default Android keyboard during password or sensitive text entry Disable sensors while entering text into password fields Collaborate with context awareness groups or side channel attack researchers Consider research into swiping gestures 26
  • 27.  KeySens ◦ Use keyboard interaction to detect unauthorized users  SenSec ◦ Leverage keyboard and sensors to block unauthorized users   Applications Next Steps 27
  • 28.    CyLab at Carnegie Mellon Northrop Grumman Cybersecurity Research Consortium Cisco ◦ Research award for ―Privacy Preserved Personal Big Data Analytics through Fog Computing'' Cybersecurity Research Consortium 28
  • 29. Passive User Authentication through Microbehavior Modeling of Soft Keyboard Interaction Thank You MobiCASE 2013 29
  • 30.          Salil P. Banerjee and Damon L. Woodard. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 2012. Francesco Bergadano, Daniele Gunetti, and Claudia Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367–397, November 2002. Liang Cai and Hao Chen. On the practicality of motion based keystroke inference attack. In Stefan Katzenbeisser, Edgar Weippl, L.Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang, editors, Trust and Trustworthy Computing, volume 7344 of Lecture Notes in Computer Science, pages 273–290. Springer Berlin Heidelberg, 2012. F. Cherifi, B. Hemery, R. Giot, M. Pasquet, and C. Rosenberger. Performance evaluation of behavioral biometric systems. In Behavioral Biometrics for Human Identication: Intelligent Applications, pages 57–74. IGI Global, 2010. Richard O. Duda, Peter E. Hart, and David. G. Stork. Multi-layer neural networks. In Pattern Classication, 2nd Edition, volume 2. John Wiley and Sons, Inc., 2001. M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. Information Forensics and Security, IEEE Transactions on, 8(1):136–148, 2013. Dawud Gordon, Jrgen Czerny, and Michael Beigl. Activity recognition for creatures of habit. Personal and Ubiquitous Computing, pages 1–17, 2013. Paul Holleis, Jussi Huhtala, and Jonna H¨akkil¨a. Studying applications for touch-enabled mobile phone keypads. In Proceedings of the 2nd international conference on Tangible and embedded interaction, TEI ’08, pages 15–18, New York, NY, USA, 2008. ACM. Anil Jain, Lin Hong, and Sharath Pankanti. Biometric identification. Commun. ACM, 43(2):90– 98, February 2000. 30
  • 31.         K.S. Killourhy and R.A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference on, pages 125–134, 2009. Emanuele Maiorana, Patrizio Campisi, Noelia Gonz´alez-Carballo, and Alessandro Neri. Keystroke dynamics authentication for mobile phones. In Proceedings of the 011 ACM Symposium on Applied Computing, SAC ’11, pages 21–26, New York, NY, USA, 2011. ACM. Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile ’12, pages 9:1–9:6, New York, NY, USA, 2012. ACM. A. Peacock, Xian Ke, and M. Wilkerson. Typing patterns: a key to user identification. Security Privacy, IEEE, 2(5):40 –47, sept.-oct. 2004. Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. Implicit authentication through learning user behavior. In Mike Burmester, Gene Tsudik, Spyros Magliveras, and Ivana Ili, editors, Information Security, volume 6531 of Lecture Notes in Computer Science, pages 99–113. Springer Berlin Heidelberg, 2011. Saira Zahid, Muhammad Shahzad, SyedAli Khayam, and Muddassar Farooq. Keystroke-based user identification on smart phones. In Engin Kirda, Somesh Jha, and Davide Balzarotti, editors, Recent Advances in Intrusion Detection, volume 5758 of Lecture Notes in Computer Science, pages 224–243. Springer Berlin Heidelberg, 2009. Jiang Zhu, Hao Hu, Sky Hu, Pang Wu, and Joy Ying Zhang. Mobile behaviometrics: Models and applications. In Proceedings of the Second IEEE/CIC Inter- national Conference on Communications in China (ICCC), Xi’An, China, August 12-14 2013. Jiang Zhu, Pang Wu, Xiao Wang, Adrian Perrig, Jason Hong, and Joy Ying Zhang. Sensec: Mobile application security through passive sensing. In Proceedings of International Conference on Computing, Networking and Communications. (ICNC 2013), San Diego, CA, USA, January 2831 2013. 31

Editor's Notes

  1. Nurse’s name is Nora
  2. Models were trained with 3000 keystrokes from primary user and 2000 from each of 3 other users.
  3. Models were trained with 3000 keystrokes from primary user and 2000 from each of 3 other users. These models were tested against [on average] 539 ‘primary user’ keystrokes and 489 keystrokes from a wide variety of other users (not used to train the model)