Overview
Explore the innovative use of typing biometrics in cybersecurity through this DefCamp 2016 conference talk. Delve into the three secrets of biometrics, various types, and their applications in preventing phishing and intrusion. Learn about continuous authentication, the challenges of hacking typing biometrics, and the implementation of multiple algorithms. Discover how this technology works on mobile devices, its effectiveness against bots, and its potential in voice spoofing prevention. Gain insights into the Keyboard Builder tool and understand the impact of factors like alcohol consumption on typing patterns. This 36-minute presentation offers a comprehensive look at how typing biometrics are revolutionizing hacking and social engineering defenses in the information security field.
Syllabus
Intro
Three Secrets
Types of Biometrics
What we think
Fishing
What a system sees
Two types of cases
What we do
Who uses it today
Continuous Authentication
Prevent Intrusion
Typing Biometrics
Can it be hacked
Multiple algorithms
Other systems
Conclusion
Voice spoofing
Authentication
Keyboard Builder
What happens if you drink
Technology works on mobile
Typing vs Bots
Taught by
DefCamp