1. As on date Passwords are the most common form of identification but at the same time they are also the weakest. Though they are gradually being offered with replacements from the field of bio metrics,picture passwords and OTPs etc...still it will take its time before passwords are a forgotten past..now comes another cool option to identify uniquely....the concept is likely to surprise you if you have not heard of it before!!!!this is known as Keystroke Dynamics.The key points about this are bought out below in brief :
- Know as Deepnet Security’s TypeSense keystroke dynamics software.
2. But as on date the limitation is that typing style can vary greatly depending on whether you are tired, distracted, angry, medicated, or any number of other circumstances. These variations can cause the software to make false positive or negative errors.
3. At DEFCON : 17, Andrea Barisani and Daniele Bianco demonstrated how to sniff keystrokes using unconventional side channel attacks. Wires in PS/2 keyboards leak information from the data wire into the ground wire which acts like an antenna. The leaked information about the keyboard strokes can be detected on the power outlet, as well as other wires on the same electrical system. By slicing open one of these lines, cutting the ground wire and attaching a probe, the line can be monitored and the signal isolated by filtering out the noise using software such as Scilab. The waves from the oscilloscope and the data can be streamed to the hacker’s computer where additional software is used to extract the victim’s keystroke information.Well..well ..well......there is no end!!!!
4. Thanks https://www.mafiasecurity.com/access-control/keystroke-dynamics/ and http://www.deepnetsecurity.com/tokens/bio/typesense/
- Know as Deepnet Security’s TypeSense keystroke dynamics software.
- TypeSense is an authentication solution based on the science of typeprint recognition that uses keystroke dynamics to accurately identify a user by the way they type characters across a keyboard.
- Keystroke Dynamics technology extracts the distinctive characteristics found in typed sequences of characters, and creates a statistically unique signature from the typing patterns of a person.
- These distinctive features include the duration for which keys are held and the elapsed time between successive keystrokes. This type of software runs in the background and constantly monitors your key stokes, learns your style, and can detect if your computer’s been hijacked.
- It’s relatively user-friendly and low-cost.
- It’s mobile and can be used to access your online accounts from anywhere and can be easily integrated in your existing authentication infrastructure.
- Keystroke Dynamics technology extracts the distinctive characteristics found in typed sequences of characters, and creates a statistically unique signature from the typing patterns of a person.
- These distinctive features include the duration for which keys are held and the elapsed time between successive keystrokes. This type of software runs in the background and constantly monitors your key stokes, learns your style, and can detect if your computer’s been hijacked.
- It’s relatively user-friendly and low-cost.
- It’s mobile and can be used to access your online accounts from anywhere and can be easily integrated in your existing authentication infrastructure.
2. But as on date the limitation is that typing style can vary greatly depending on whether you are tired, distracted, angry, medicated, or any number of other circumstances. These variations can cause the software to make false positive or negative errors.
3. At DEFCON : 17, Andrea Barisani and Daniele Bianco demonstrated how to sniff keystrokes using unconventional side channel attacks. Wires in PS/2 keyboards leak information from the data wire into the ground wire which acts like an antenna. The leaked information about the keyboard strokes can be detected on the power outlet, as well as other wires on the same electrical system. By slicing open one of these lines, cutting the ground wire and attaching a probe, the line can be monitored and the signal isolated by filtering out the noise using software such as Scilab. The waves from the oscilloscope and the data can be streamed to the hacker’s computer where additional software is used to extract the victim’s keystroke information.Well..well ..well......there is no end!!!!
4. Thanks https://www.mafiasecurity.com/access-control/keystroke-dynamics/ and http://www.deepnetsecurity.com/tokens/bio/typesense/