[go: up one dir, main page]

0% found this document useful (0 votes)
12 views2 pages

Keystroke Dynamics for Secure Mobile Authentication

The document discusses the increasing use of smartphones for storing personal information and accessing sensitive data, highlighting the need for secure user identification. It proposes a protocol for keystroke dynamics analysis that enhances traditional password protection for web-based services while addressing the limitations of current authentication methods. A prototype implementation of this protocol is presented using the Android operating system.

Uploaded by

Boluwatife Dare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Keystroke Dynamics for Secure Mobile Authentication

The document discusses the increasing use of smartphones for storing personal information and accessing sensitive data, highlighting the need for secure user identification. It proposes a protocol for keystroke dynamics analysis that enhances traditional password protection for web-based services while addressing the limitations of current authentication methods. A prototype implementation of this protocol is presented using the Android operating system.

Uploaded by

Boluwatife Dare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

My First LaTeX Document

Nauman
October 16, 2011

Abstract
Smartphones are increasingly being used to store personal informa-
tion as well as to access sensitive data from the Internet and the cloud.
Establishment of the identity of a user requesting information from smart-
phones is a prerequisite for secure systems in such scenarios. In the
past, keystroke-based user identifiation has been successfully deployed on
production-level mobile devices to mitigate the risks associated with naive
username/password based authentication. However, these approaches
have two major limitations: they are not applicable to services where
authentication occurs outside the domain of the mobile device such as
web-based services; and they often overly tax the limited computational
capabilities of mobile devices.
In this paper, we propose a protocol for keystroke dynamics analysis
which allows web-based applications to make use of remote attestation
and delegated keystroke analysis. The end result is an efficient keystroke-
based user identification mechanism that strengthens traditional password
protected services while mitigating the risks of user profiling by collabo-
rating malicious web services. We present a prototype implementation of
our protocol using the popular Android operating system for smartphones.

1 Introduction
This is going to be a normal paragraph in our introduction.

1.1 Some Background


Some more stuff.

1.1.1 Drilled Down


More information here.

1
1 1 SR SP SR
SP SR SP 2
4

4 1 2 3
3 2 4 3

VS VS VS

a) Pushed Validation b) Pulled Validation c) Delegated Validation

Figure 1: My First Figure

Head 1 Head 2 Head 3 Head 4


1 2 3 4

Table 1: My First Table

2 Background
2.1 More Stuff: Tables and Figures
To insert a figure, you can use the TeXnicecenter menus.
Now for a table!

2.2 More Stuff


Some text here that wants to refer to Table 1. You can also refer to the Figure 1.
When you want to refer to a previous section, you can use the \ref command
again. Section 2 and Section 1.1.1.

2.3 Sub section through input command


This comes from a separate file. Notice that we have this subsection included
in the Navigator.

You might also like