Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Privacy and biometrics for smart healthcare systems: attacks, and techniques

A Wells, AB Usman - Information Security Journal: A Global …, 2024 - Taylor & Francis
Biometric technology has various applications in smart healthcare systems, including patient
authentication, health monitoring, telemedicine, clinical decision support, and personalized …

Network Detection of Interactive {SSH} Impostors Using Deep Learning

J Piet, A Sharma, V Paxson, D Wagner - 32nd USENIX Security …, 2023 - usenix.org
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …

[HTML][HTML] Towards liveness detection in keystroke dynamics: Revealing synthetic forgeries

N González, EP Calot, JS Ierache… - Systems and Soft …, 2022 - Elsevier
While the accuracy of keystroke dynamics verification systems has traditionally been
evaluated using a zero-effort attack model, the current trend is to recognize that such an …

On the shape of timings distributions in free-text keystroke dynamics profiles

N González, EP Calot, JS Ierache, W Hasperué - Heliyon, 2021 - cell.com
Keystroke dynamics is a soft biometric trait. Although the shape of the timing distributions in
keystroke dynamics profiles is a central element for the accurate modeling of the behavioral …

Keystroke biometric user verification using Hidden Markov Model

ML Ali, K Thakur, CC Tappert… - 2016 IEEE 3rd …, 2016 - ieeexplore.ieee.org
Biometric systems such as fingerprint, iris, DNA became popular methods in user
authentication. Compared to these biometric systems, keystroke biometric authentication …

SWIPEGAN: swi** data augmentation using generative adversarial networks for smartphone user authentication

A Buriro, F Ricci, B Crispo - Proceedings of the 3rd ACM workshop on …, 2021 - dl.acm.org
Behavioral biometric-based smartphone user authentication schemes based on touch/swipe
have shown to provide the desired usability. However, their accuracy is not yet considered …

Becaptcha-type: Biometric keystroke data generation for improved bot detection

D DeAlcala, A Morales, R Tolosana… - Proceedings of the …, 2023 - openaccess.thecvf.com
This work proposes a data driven learning model for the synthesis of keystroke biometric
data. The proposed method is compared with two statistical approaches based on Universal …

[HTML][HTML] Ksdsld—a tool for keystroke dynamics synthesis & liveness detection

N González - Software Impacts, 2023 - Elsevier
Keystroke dynamics is a behavioral biometrics modality that employs the characteristic
ty** patterns of users to verify their identity, generally as a part of a multifactor …