{"id":91942,"date":"2019-06-11T13:04:33","date_gmt":"2019-06-11T20:04:33","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/06\/new-computer-attack-mimics-users-keystroke-characteristics-and-evades-detection"},"modified":"2019-06-11T13:04:33","modified_gmt":"2019-06-11T20:04:33","slug":"new-computer-attack-mimics-users-keystroke-characteristics-and-evades-detection","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/06\/new-computer-attack-mimics-users-keystroke-characteristics-and-evades-detection","title":{"rendered":"New computer attack mimics user\u2019s keystroke characteristics and evades detection"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-computer-attack-mimics-users-keystroke-characteristics-and-evades-detection2.jpg\"><\/a><\/p>\n<p>Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard evades several detection products that are intended to continuously verify the user\u2019s identity based on personalized keystroke characteristics.<\/p>\n<p>The new paper, \u201cMalboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,\u201d published in the <i>Computer and Security<\/i> journal, reveals a sophisticated attack in which a compromised USB <a href=\"https:\/\/techxplore.com\/tags\/keyboard\/\" rel=\"tag\" class=\"\">keyboard<\/a> automatically generates and sends malicious keystrokes that mimic the attacked user\u2019s behavioral characteristics.<\/p>\n<p>Keystrokes generated maliciously do not typically match human typing and can easily be <a href=\"https:\/\/techxplore.com\/tags\/detected\/\" rel=\"tag\" class=\"\">detected<\/a>. Using artificial intelligence, however, the Malboard attack autonomously generates commands in the user\u2019s style, injects the keystrokes as malicious software into the keyboard and evades detection. The keyboards used in the research were products by Microsoft, Lenovo and Dell.<\/p>\n<p><a href=\"https:\/\/techxplore.com\/news\/2019-06-mimics-user-keystroke-characteristics-evades.html\" target=\"_blank\" rel=\"noopener noreferrer\"><\/p>\n<div style=\"clear:both;\">Read more<\/div>\n<p><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard evades several detection products that are intended to continuously verify the user\u2019s identity based on personalized keystroke characteristics. The new paper, \u201cMalboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,\u201d published in the [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-91942","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/91942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=91942"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/91942\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=91942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=91942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=91942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}