Skip to main content
Article
The Impact of Application Context on Privacy and Performance of Keystroke Authentication Systems
Journal of Computer Security (2018)
  • Michael O'Neal, Louisiana Tech University
  • Kiran S. Balagani, New York Institute of Technology
  • Paolo Gasti, New York Institute of Technology
  • Aaron Elliott, Aegis Research Lab, LLC
  • Azriel Richardson, Louisiana Tech University
Abstract
In this paper, we show that keystroke latencies used in continuous user authentication systems disclose application context, i.e., in which application user is entering text. Using keystroke data collected from 62 subjects, we show that an adversary can infer application context from keystroke latencies with 95.15% accuracy. To prevent leakage from keystroke latencies, and prevent exposure of application context, we develop privacy-preserving authentication protocols in the outsourced authentication model. Our protocols implement two popular matching algorithms designed for keystroke authentication, called Absolute (“A”) and Relative (“R”). With our protocols, the client reveals no information to the server during authentication, besides the authentication result. Our experiments show that these protocols are fast in practice: with 100 keystroke features, authentication was completed in about one second with the “A” protocol, and in 595 ms with the “R” protocol. Further, because the asymptotic cost of our protocols is linear, they can scale to a large number of features. On the other hand, by leveraging application context we were able to reduce HTER from 14.7% with application-agnostic templates, to as low as 5.8% with application-specific templates.
Keywords
  • Biometrics,
  • keystroke authentication,
  • privacy,
  • privacy-preserving protocols,
  • application context
Disciplines
Publication Date
2018
Citation Information
Michael O'Neal, Kiran S. Balagani, Paolo Gasti, Aaron Elliott, et al.. "The Impact of Application Context on Privacy and Performance of Keystroke Authentication Systems" Journal of Computer Security Vol. 26 Iss. 4 (2018) p. 543 - 556
Available at: http://works.bepress.com/michael-oneal/1/