140 likes | 228 Views
PLAY THE KEYBOARD. Zhao Tian Kai Liu. Outline. 1. Motivation. 2. Related Work. 3. Proposed Solution. 4. Preliminary Results. Password Is Not Secure. Numerous passwords in the Internet. Security is significant!. Passwords around us. Secure?. NO!. When Password Is Disclosed.
E N D
PLAY THE KEYBOARD Zhao Tian Kai Liu
Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results
Password Is Not Secure Numerous passwords in the Internet. Security is significant! Passwords around us Secure? NO!
When Password Is Disclosed We could let out our key accidently How to protect the password even if it has already been disclosed?
Analogy: Password vs. Music Score Can we distinguish the keyboard players? VS Same as the music score, the players can be distinguished.
Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results
Ways To Enhance Authentication Digital Identification Biometrics Cost too much
Keystroke Pattern “Research results demonstrate that users follow generally certain patterns when they are writing their password.” Coltell, O., Badfa, J.M., Torres, G., “Biometric identification system based on keyboard filtering”, Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on, On page(s): 203-209
Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results
Input & Send the Password V V m m d d 5 5 r r q q 2 2 o o t1 t2 t3 t4 t5 t6 t7 t8 Time
Receive & Match the Password Match V m d 5 r q 2 o t1 t2 t3 t4 t5 t6 t7 t8 Stored Pattern V m d 5 r q 2 o s1 s2 s3 s4 s5 s6 s7 s8 Time Time
Outline 1. Motivation 2. Related Work 3. Proposed Solution 4. Preliminary Results
Password Is Stolen Not Match 2 o V m 5 r d q t7 t8 t1 t2 t4 t5 t3 t6 Stored Pattern V m d 5 r q 2 o s1 s2 s3 s4 s5 s6 s7 s8 Time Time