March 9, 2023, 2:10 a.m. | Rashik Shadman, Ahmed Anu Wahab, Michael Manno, Matthew Lukaszewski, Daqing Hou, Faraz Hussain

cs.CR updates on arXiv.org arxiv.org

Reliably identifying and authenticating users remains integral to computer
system security. Various novel authentication tenchniques such as biometric
authentication systems have been devised in recent years. This paper surveys
keystroke-based authentication systems and their applications such as
continuous authentication. Keystroke dynamics promises to be non-intrusive and
cost-effective as no addition hardware is required other than a keyboard. This
survey can be a reference for researchers working on keystroke dynamics.

addition applications authentication biometric computer concepts continuous continuous authentication cost hardware intrusive keyboard non novel reference researchers security survey surveys system systems techniques working

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Security Cloud Solution Architect

@ Microsoft | London, London, United Kingdom

Compliance Program Analyst

@ SailPoint | United States

Software Engineer III, Infrastructure, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Cryptography Expert

@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine

Senior Cyber Intelligence Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States