Skip to main content

Table 9 Attack specification of some keystroke dynamics spoofing methods

From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded video

Methods

Attack medium

Target platform

Attack requirement

Malboard [21]

Hardware (USB) Keylogger

Computer

1. Need to install arbitrary keylogger hardware (USB)

2. Require more combinations of keystrokes data collected to achieve higher similarity

Mimicry [30]

Video of Smartphone Typing Activities (Touchscreen)

Smartphone

1. Victim’s finger must be visible on the video

2. Attacker needs to train themselves to mimic the victim’s typing behaviour, the proposed method only provides visual real-time guidance

Our Method

Screen-recorded Video

Both Computer & Smartphone

1. Victim’s screen must be recorded (e.g., through screen sharing activity)

2. Require more combinations of keystrokes data collected to achieve higher similarity