EURASIP Journal on Information Security (Feb 2020)

Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines

  • Nicholas Whiskerd,
  • Nicklas Körtge,
  • Kris Jürgens,
  • Kevin Lamshöft,
  • Salatiel Ezennaya-Gomez,
  • Claus Vielhauer,
  • Jana Dittmann,
  • Mario Hildebrandt

DOI
https://doi.org/10.1186/s13635-020-0100-8
Journal volume & issue
Vol. 2020, no. 1
pp. 1 – 16

Abstract

Read online

Abstract A feature of search engines is prediction and suggestion to complete or extend input query phrases, i.e. search suggestion functions (SSF). Given the immediate temporal nature of this functionality, alongside the character submitted to trigger each suggestion, adequate data is provided to derive keystroke features. The potential of such biometric features to be used in identification and tracking poses risks to user privacy.For our initial experiment, we evaluate SSF traffic with different browsers and search engines on a Linux PC and an Android mobile phone. The keystroke network traffic is captured and decrypted using mitmproxy to verify if expected keystroke information is contained, which we call quality assurance (QA). In our second experiment, we present first results for identification of five subjects searching for up to three different phrases on both PC and phone using naive Bayesian and nearest neighbour classifiers. The third experiment investigates potential for identification and verification by an external observer based purely on the encrypted traffic, thus without QA, using the Euclidean distance. Here, ten subjects search for two phrases across several sessions on a Linux virtual machine, and statistical features are derived for classification. All three test cases show positive tendencies towards the feasibility of distinguishing users within a small group. The results yield lowest equal error rates of 5.11% for the single PC and 11.37% for the mobile device with QA and 23.61% for various PCs without QA. These first tendencies motivate further research in feature analysis of encrypted network traffic and prevention approaches to ensure protection and privacy.

Keywords