Researchers develop cyberattack that mimics keyboard keystrokes, evades detection

SHARE:

A group of security researchers has developed a new cyberattack called Malboard that mimics the victims’ keystroke characteristics and uses ...

A group of security researchers has developed a new cyberattack called Malboard that mimics the victims’ keystroke characteristics and uses Artificial Intelligence (AI) to inject malicious software onto a system. The team from Ben-Gurion University of the Negev (BGU) in Israel, which also developed the attacks’ detection mechanisms, said that Malboard even evades several detection products that are intended to continuously verify the user's identity based on personalised keystroke characteristics.

The keyboards used in the research were from Microsoft, Lenovo and Dell, the team notes in their paper named “Malboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,” published in the journal Computer and Security. According to researchers, the keystrokes generated maliciously by a compromised USB keyboard do not typically match human typing and can easily be detected. Malboard uses AI to autonomously generate commands in the users’ style to attack a system and evade detection.

“In the study, 30 people performed three different keystroke tests against three existing detection mechanisms including KeyTrac, TypingDNA and DuckHunt. Our attack evaded detection in 83 percent to 100 percent of the cases,” Dr Nir Nissim, Head of the David and Janet Polak Family Malware Lab at Cyber at BGU, said in the paper. “Malboard was effective in two scenarios: by a remote attacker using wireless communication to communicate, and by an inside attacker or employee who physically operates and uses Malboard,” added Nissim, who is also a member of the BGU Department of Industrial Engineering and Management.

“Our proposed detection modules are trusted and secured, based on information that can be measured from side-channel resources, in addition to data transmission. These include (1) the keyboard's power consumption; (2) the keystrokes' sound; and (3) the user's behavior associated with his or her ability to respond to typographical errors,” Nitzan Farhi, a BGU student who developed both the attack and detection mechanisms, noted.

The team proposes using the detection framework for every keyboard when it is initially purchased and daily at the outset. The researchers plan to expand their work on other popular USB devices, including computer mouse user movements, clicks and duration of use. They are also planning to enhance the typo insertion detection module and combine it with other existing keystroke dynamic mechanisms for user authentication because, reportedly, this behaviour is difficult to replicate.

Source



from Latest Technology News http://bit.ly/2KuPCzj

COMMENTS

Name

7,1,Airtel,1,Andriod,1,Android,4,Android Q,1,apex,1,Apple,7,Apps,1,Asus Rog,1,Black Shark 2,2,Boeing 737 MAX,1,Bsnl,2,camera,2,CPU,3,Donald Trump,1,Earphone,1,Facebook,5,Fan,1,Fitbit,1,foldable Phone,2,Fortnite,1,Galaxy A40,1,Galaxy s10,1,Galaxy s10e,1,Games,10,gaming,1,Google,6,Google Pixel 2,1,Honor 10i,1,Huawe,1,Huawei,6,Huawei GT,1,IBM,1,Instagram,2,Internet,2,ios,2,iPad,2,iphone,2,Israel,1,jiomart,1,Laptop,1,Leica Q2,1,M20,1,mac,1,MacOS,1,Mi 9,1,Mi A2,1,Mi LED TV,1,MicroSoft,3,mobile,1,Moon,2,Mozilla,1,Nasa,2,News,1,Nokia,4,Nokia 62,1,Nvidias,1,OnePlus,4,Oppo,5,P30,3,Pixel,1,Poco F1,1,Pubg,12,Qualcomm,2,Redmi 3,1,Redmi 6 Pro,1,Redmi 7,1,Redmi Note 7,1,reliance,1,Reno,1,samsung,11,Skype,1,SmartPhone,56,Social,5,Spotify,1,Tech,35,Telecom,3,Touchpad,1,Tournament,1,TV,1,Twitter,1,Vivo,2,Watch,2,WhatsApp,1,Xbox,1,Xiaomi,16,y9li,1,
ltr
item
Genius Baba: Researchers develop cyberattack that mimics keyboard keystrokes, evades detection
Researchers develop cyberattack that mimics keyboard keystrokes, evades detection
http://feeds.feedburner.com/~r/digit/latest-news/~4/vhvpza6QOEQ
Genius Baba
https://geniusbabaa.blogspot.com/2019/06/researchers-develop-cyberattack-that.html
https://geniusbabaa.blogspot.com/
https://geniusbabaa.blogspot.com/
https://geniusbabaa.blogspot.com/2019/06/researchers-develop-cyberattack-that.html
true
7104319406113350277
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy