also be modified in order to include the knowledge of
non-protected users references. Other KDAS are also
possible, e.g. using non-regular discretization, using
non-uniform random laws, or by merging KDAS (e.g.
merging delay and rdelay). An hardware implemen-
tation of such KDAS, could be also imagined, e.g.
in the form of a programmable USB to USB device
between the keyboard and the computer. Presented
KDAS techniques could be applied to mouse events.
REFERENCES
Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., G
¨
urses,
S., Piessens, F., and Preneel, B. (2013). Fpdetective:
dusting the web for fingerprinters. In Proceedings of
the 2013 ACM SIGSAC conference on Computer &
communications security, pages 1129–1140. ACM.
Boda, K., F
¨
oldes,
´
A., Guly
´
as, G., and Imre, S. (2012).
User tracking on the web via cross-browser finger-
printing. Information Security Technology for Appli-
cations, pages 31–46.
Cao, S. Y. and Wijmans, E. (2017). Browser fingerprinting
via os and hardware level features. Network & Dis-
tributed System Security Symposium, NDSS, 17.
Eckersley, P. (2010). How unique is your web browser? In
International Symposium on Privacy Enhancing Tech-
nologies Symposium, pages 1–18. Springer.
Epp, C. (2010). Identifying emotional states through
keystroke dynamics. Master’s thesis, University of
Saskatchewan, Saskatoon, CANADA.
Gaines, R., Lisowski, W., Press, S., and Shapiro, N. (1980).
Authentication by keystroke timing: some prelimi-
nary results. Technical Report R-2567-NSF, Rand
Corporation.
Giot, R., Abed, M. E., and Rosenberger, C. (2012). Web-
based benchmark for keystroke dynamics biometric
systems: a statistical analysis. In Intelligent In-
formation Hiding and Multimedia Signal Processing
(IIH-MSP), 2012 Eighth International Conference on,
pages 11–15. IEEE.
Giot, R., El-Abed, M., Hemery, B., and Rosenberger, C.
(2011). Unconstrained keystroke dynamics authen-
tication with shared secret. Computers & Security,
30(6-7):427–445.
Giot, R., El-Abed, M., and Rosenberger, C. (2009). Greyc
keystroke: a benchmark for keystroke dynamics bio-
metric systems. In IEEE International Conference on
Biometrics: Theory, Applications and Systems (BTAS
2009), pages 1–6.
Giot, R. and Rosenberger, C. (2012). A new soft biomet-
ric approach for keystroke dynamics based on gen-
der recognition. International Journal of Information
Technology and Management (IJITM). Special Issue
on : ”Advances and Trends in Biometrics by Dr Li-
dong Wang, 11(1/2):35–49.
Hocquet, S., Ramel, J.-Y., and Cardot, H. (2007). User
classification for keystroke dynamics authentication.
In The Sixth International Conference on Biometrics
(ICB2007), pages 531–539.
Jorgensen, Z. and Yu, T. (2011). On mouse dynamics as
a behavioral biometric for authentication. In Proceed-
ings of the 6th ACM Symposium on Information, Com-
puter and Communications Security, pages 476–482.
ACM.
Killourhy, K. and Maxion, R. (2008). The effect of clock
resolution on keystroke dynamics. In Proceedings of
the 11th international symposium on Recent Advances
in Intrusion Detection, pages 331–350. Springer.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly detectors for keystroke dynamics. In Proc. of
the 39th Ann. Int. Conf. on Dependable Systems and
Networks, pages 125–134.
Kim, J., Kim, H., and Kang, P. (2018). Keystroke dynamics-
based user authentication using freely typed text based
on user-adaptive feature extraction and novelty detec-
tion. Applied Soft Computing, 62:1077–1087.
Laperdrix, P., Rudametkin, W., and Baudry, B. (2016).
Beauty and the beast: Diverting modern web browsers
to build unique browser fingerprints. Security and Pri-
vacy (SP), pages 878–894.
Lee, H. and Cho, S. (2007). Retraining a keystroke
dynamics-based authenticator with impostor patterns.
Computers & Security, 26(4):300–310.
Monaco, V. (2018). Public keystroke dynamics datasets.
Monrose, F. and Rubin, A. (2000). Keystroke dynamics
as a biometric for authentication. Future Generation
Computer Syststems, 16(4):351–359.
Moore, P. and Thorsheim, P. (2016). Keyboard privacy plu-
gin.
Nikiforakis, N., Joosen, W., and Livshits, B. (2015). Privar-
icator: Deceiving fingerprinters with little white lies.
Proceedings of the 24th International Conference on
World Wide Web, pages 820–830.
Revett, K., de Magalhaes, S., and Santos, H. (2007a).
On the use of rough sets for user authentication via
keystroke dynamics. In EPIA Workshops, pages 145–
159.
Revett, K., Gorunescu, F., Gorunescu, M., Ene, M., Ten-
reiro, S. d. M., and Santos, H. M. D. (2007b). A ma-
chine learning approach to keystroke dynamics based
user authentication. International Journal of Elec-
tronic Security and Digital Forensics, 1:55–70.
Shen, C., Cai, Z., Guan, X., Du, Y., and Maxion, R. A.
(2013). User authentication through mouse dynam-
ics. IEEE Transactions on Information Forensics and
Security, 8(1):16–30.
Spillane, R. (1975). Keyboard apparatus for personal iden-
tification. IBM Technical Disclosure Bulletin.
Umphress, D. and Williams, G. (1985). Identity verifica-
tion through keyboard characteristics. Internat. J. Man
Machine Studies, 23:263–273.
Weinberg, Z., Chen, E. Y., Jayaraman, P. R., and Jackson,
C. (2011). I still know what you visited last summer:
Leaking browsing history via user interaction and side
channel attacks. Security and Privacy (SP).
Keystroke Dynamics Anonymization System
455