A Deep-Learning-Based Approach to Keystroke-Injection Payload Generation
-
Published:2023-06-30
Issue:13
Volume:12
Page:2894
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Gurčinas Vitalijus1ORCID, Dautartas Juozas1, Janulevičius Justinas1, Goranin Nikolaj1ORCID, Čenys Antanas1ORCID
Affiliation:
1. Department of Information Systems, Faculty of Fundamental Sciences, Vilnius Gediminas Technical University, LT-10223 Vilnius, Lithuania
Abstract
Investigation and detection of cybercrimes has been in the spotlight of cybersecurity research for as long as the topic has existed. Modern methods are required to keep up with the pace of the technology and toolset used to facilitate these crimes. Keystroke-injection attacks have been an issue due to the limitations of hardware and software up until recently. This paper presents comprehensive research on keystroke-injection payload generation that proposes the use of deep learning to bypass the security of keystroke-based authentication systems focusing on both fixed-text and free-text scenarios. In addition, it specifies the potential risks associated with keystroke-injection attacks. To ensure the legitimacy of the investigation, a model is proposed and implemented within this context. The results of the implemented implant model inside the keyboard indicate that deep learning can significantly improve the accuracy of keystroke dynamics recognition as well as help to generate effective payload from a locally collected dataset. The results demonstrate favorable accuracy rates, with reported performance of 93–96% for fixed-text scenarios and 75–92% for free-text. Accuracy across different text scenarios was achieved using a small dataset collected with the proposed implant model. This dataset enabled the generation of synthetic keystrokes directly within a low-computation-power device. This approach offers efficient and almost real-time keystroke replication. The results obtained show that the proposed model is sufficient not only to bypass the fixed-text keystroke dynamics system, but also to remotely control the victim’s device at the appropriate time. However, such a method poses high security risks when deploying adaptive keystroke injection with impersonated payload in real-world scenarios.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference70 articles.
1. Tian, J., Scaife, N., Kumar, D., Bailey, M., Bates, A., and Butler, K. (2018, January 20–24). SoK: ‘Plug & Pray’ Today-Understanding USB Insecurity in Versions 1 Through C. Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA. 2. Lu, H., Wu, Y., Li, S., Lin, Y., Zhang, C., and Zhang, F. (2021, January 27). BADUSB-C: Revisiting BadUSB with Type-C. Proceedings of the 2021 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA. 3. Duck Hunt: Memory forensics of USB attack platforms;Thomas;Forensic Sci. Int. Digit. Investig.,2021 4. Mohammadmoradi, H., and Gnawali, O. (2018, January 18–20). Making whitelisting-based defense work against bad USB. Proceedings of the 2nd International Conference on Smart Digital Environment, ICSDE’18, Rabat, Morocco. ACM International Conference Proceeding Series. 5. USB powered devices: A survey of side-channel threats and countermeasures;Liu;High Confid. Comput.,2021
|
|