Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation

There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Monaco, John V, Tappert, Charles C
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Monaco, John V
Tappert, Charles C
description There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because masking spatial information, such as IP address, is not sufficient as users become more identifiable by their behavior. In this work, the well-known Chaum mix is generalized to a scenario in which users are separated by both space and time with the goal of preventing an observing adversary from identifying or impersonating the user. The criteria of a behavior obfuscation strategy are defined and two strategies are introduced for obfuscating typing behavior. Experimental results are obtained using publicly available keystroke data for three different types of input, including short fixed-text, long fixed-text, and long free-text. Identification accuracy is reduced by 20% with a 25 ms random keystroke delay not noticeable to the user.
doi_str_mv 10.48550/arxiv.1609.07612
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1609_07612</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1609_07612</sourcerecordid><originalsourceid>FETCH-LOGICAL-a672-840d2e194813830278a11ea18d588bc33822287e3fed968472a828b604f6a7683</originalsourceid><addsrcrecordid>eNotj8tqwzAUBbXpoqT9gK6qH7Crl6XrZQh9mIZk472Ro6siEktBdk3z903crg4MzIEh5ImzUkFVsRebf8Jccs3qkhnNxT3Z7Xv_PR7sFOIX_cTLOOV0RNqGAWkTJ8yzPY10SnQ9p-Bo4zBOwYebkCK18YqGM-YxxYU8kDt_FfDxf1ekfXttNx_Fdv_ebNbbwmojClDMCeS1Ai5BMmHAco6Wg6sA-oOUIIQAg9KjqzUoIywI6DVTXlujQa7I89_tEtSdcxhsvnS3sG4Jk7-XcUgF</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation</title><source>arXiv.org</source><creator>Monaco, John V ; Tappert, Charles C</creator><creatorcontrib>Monaco, John V ; Tappert, Charles C</creatorcontrib><description>There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because masking spatial information, such as IP address, is not sufficient as users become more identifiable by their behavior. In this work, the well-known Chaum mix is generalized to a scenario in which users are separated by both space and time with the goal of preventing an observing adversary from identifying or impersonating the user. The criteria of a behavior obfuscation strategy are defined and two strategies are introduced for obfuscating typing behavior. Experimental results are obtained using publicly available keystroke data for three different types of input, including short fixed-text, long fixed-text, and long free-text. Identification accuracy is reduced by 20% with a 25 ms random keystroke delay not noticeable to the user.</description><identifier>DOI: 10.48550/arxiv.1609.07612</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2016-09</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1609.07612$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1609.07612$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Monaco, John V</creatorcontrib><creatorcontrib>Tappert, Charles C</creatorcontrib><title>Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation</title><description>There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because masking spatial information, such as IP address, is not sufficient as users become more identifiable by their behavior. In this work, the well-known Chaum mix is generalized to a scenario in which users are separated by both space and time with the goal of preventing an observing adversary from identifying or impersonating the user. The criteria of a behavior obfuscation strategy are defined and two strategies are introduced for obfuscating typing behavior. Experimental results are obtained using publicly available keystroke data for three different types of input, including short fixed-text, long fixed-text, and long free-text. Identification accuracy is reduced by 20% with a 25 ms random keystroke delay not noticeable to the user.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8tqwzAUBbXpoqT9gK6qH7Crl6XrZQh9mIZk472Ro6siEktBdk3z903crg4MzIEh5ImzUkFVsRebf8Jccs3qkhnNxT3Z7Xv_PR7sFOIX_cTLOOV0RNqGAWkTJ8yzPY10SnQ9p-Bo4zBOwYebkCK18YqGM-YxxYU8kDt_FfDxf1ekfXttNx_Fdv_ebNbbwmojClDMCeS1Ai5BMmHAco6Wg6sA-oOUIIQAg9KjqzUoIywI6DVTXlujQa7I89_tEtSdcxhsvnS3sG4Jk7-XcUgF</recordid><startdate>20160924</startdate><enddate>20160924</enddate><creator>Monaco, John V</creator><creator>Tappert, Charles C</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20160924</creationdate><title>Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation</title><author>Monaco, John V ; Tappert, Charles C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a672-840d2e194813830278a11ea18d588bc33822287e3fed968472a828b604f6a7683</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Monaco, John V</creatorcontrib><creatorcontrib>Tappert, Charles C</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Monaco, John V</au><au>Tappert, Charles C</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation</atitle><date>2016-09-24</date><risdate>2016</risdate><abstract>There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because masking spatial information, such as IP address, is not sufficient as users become more identifiable by their behavior. In this work, the well-known Chaum mix is generalized to a scenario in which users are separated by both space and time with the goal of preventing an observing adversary from identifying or impersonating the user. The criteria of a behavior obfuscation strategy are defined and two strategies are introduced for obfuscating typing behavior. Experimental results are obtained using publicly available keystroke data for three different types of input, including short fixed-text, long fixed-text, and long free-text. Identification accuracy is reduced by 20% with a 25 ms random keystroke delay not noticeable to the user.</abstract><doi>10.48550/arxiv.1609.07612</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1609.07612
ispartof
issn
language eng
recordid cdi_arxiv_primary_1609_07612
source arXiv.org
subjects Computer Science - Cryptography and Security
title Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T20%3A37%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Obfuscating%20Keystroke%20Time%20Intervals%20to%20Avoid%20Identification%20and%20Impersonation&rft.au=Monaco,%20John%20V&rft.date=2016-09-24&rft_id=info:doi/10.48550/arxiv.1609.07612&rft_dat=%3Carxiv_GOX%3E1609_07612%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true