nize which timings were delayed, which results in a
high security level. Moreover, thanks to changed tim-
ings distribution, which is similar to those of a real
user, it is much harder to determine that any protec-
tion is used in that case. Admittedly this method af-
fects significantly short timings so it is more appropri-
ate for well-trained typist. Manipulating p results in
shifting the occurrences of real timings to higher val-
ues and decreasing the cardinality of short timings.
The PUF based algorithm, as can be seen from
Figure 2, changes the occurrence of keyboard events
in a significant but deterministic way. Note that a dif-
ferent passwords would give different results. It is
obvious that such characteristics give the adversary
no substantial information about the user or whether
he is using any protection. However, a context analy-
sis of the data discloses that protection is used. Note
that it may happen that for a given PUF function two
occurrences of a digraph (e.g. ok) differ by about 1–
5 ms in the original message, while after the trans-
formation the difference can be much higher. Thus,
this solution may significantly change the variation of
some digraphs, making it easy for an adversary to de-
tect this kind of protection.
Note that the binary representation probability al-
gorithm flattens the histogram. As can be observed
from Figure 2 (probability p = 0.5) with the increase
of the probability p the timing distribution becomes
more similar to uniform distribution. Obviously, the
adversary is able to detect that the user is using pro-
tection if we use a higher probability p. However, it
should be harder for the adversary to gain any infor-
mation about the identity of the user as the histogram
becomes flatter.
Figure 2: Modified Timings.
6 CONCLUSIONS
In this paper we consider security algorithms work-
ing mostly in real time and what makes them difficult
to implement in real environments (responsiveness of
the system). If we could record the whole stream of
data and replay it with modified timings we would be
able to create any sequences of keyboard events we
want.
The presented solutions provide, in our opinion, a
high security level, but could effect using keystroking
as a method of verifying identity. In that case it is a
tradeoff between usability and security. For instance
the constant-time algorithm destroys the possibility of
distinguishing users, on the other hand the PUF based
algorithm transforms only one user identity into an-
other. We consider protection of identity regardless
of the user’s representation model which means that
the quality of intercepted information depends on as-
sumptions of adversary (e.g. is any protection used,
what kind of algorithm is used).
We highly recommend using a hardware-based so-
lution, if possible, because it has the following advan-
tages: (1) It cannot be disabled remotely; and (2) It
can perform more effective calculations without bur-
dening the CPU of the workstation.
REFERENCES
Bergadano, F., Gunetti, D., and Picardi, C. (2002). User au-
thentication through keystroke dynamics. ACM Trans.
Inf. Syst. Secur., 5(4):367–397.
Bergadano, F., Gunetti, D., and Picardi, C. (2003). Iden-
tity verification through dynamic keystroke analysis.
Intell. Data Anal., 7(5):469–496.
Klonowski, M., Syga, P., and Wodo, W. (2012). Some re-
marks on keystroke dynamics - global surveillance, re-
trieving information and simple countermeasures. In
SECRYPT, pages 296–301.
Monrose, F. and Rubin, A. D. (1997). Authentication via
keystroke dynamics. In ACM Conference on Com-
puter and Communications Security, pages 48–56.
Sim, T. and Janakiraman, R. (2007). Are digraphs good for
free-text keystroke dynamics? In CVPR.
Song, D. X., Wagner, D., and Tian, X. (2001). Timing anal-
ysis of keystrokes and timing attacks on ssh. In Pro-
ceedings of the 10th conference on USENIX Security
Symposium - Volume 10, pages 25–25, Berkeley, CA,
USA. USENIX Association.
Stefan, D., Shu, X., and Yao, D. D. (2012). Robustness
of keystroke-dynamics based biometrics against syn-
thetic forgeries. Computers & Security, 31(1):109–
121.
Wodo, W. (2012). Kradziez tozsamosci i podszywanie
sie pod innych uzytkownikow w systemach biom-
etrycznych opartych o keystroking. In Interdyscy-
IdentitySecurityinBiometricSystemsbasedonKeystroking
529