Timing as a side-channel vulnerability: neural network analysis of generalized PIN prediction

dc.contributor.authorClendenen, Mason
dc.date.accessioned2025-04-21T21:53:37Z
dc.date.available2025-04-21T21:53:37Z
dc.date.graduationmonthMay
dc.date.issued2025
dc.description.abstractThis study explores a potential side-channel vulnerability in Personal Identification Number (PIN) entry systems (PEDs), by analyzing keystroke timing patterns with machine learning techniques. PIN-based authentication, ubiquitous in securing physical and digital access, struggles to balance usability and security, with prior research focusing on direct threats like visual observation and proposing countermeasures such as extended PINs, or haptic feedback. This research hypothesizes that human timing behavior during 4-digit PIN entry may reveal detectable patterns exploitable by machine learning to predict PINs, posing a novel risk distinct from traditional attack vectors. Using a supervised learning model trained on latency data from a virtual keypad, the study assesses whether these patterns generalize across users, testing a 10,000-class classification problem with out-of-sample k-fold cross-validation. Results show limited pattern detection—a top-1 accuracy of 0.115% and a top-10 of 1.198%, exceeding random guessing but insufficient for practical targeted attacks— with a bias toward top-row digits (e.g., 73, 77), possibly reflecting psychological preferences for numbers like 3 and 7. While generalization remains limited by participant variability, and dataset constraints, the findings suggest a context-specific vulnerability more relevant to large-scale, non-targeted scenarios than individual breaches. This work underscores the need to consider subtle behavioral leaks in PED design, advocating for continued innovation to address emerging machine learning-driven threats.
dc.description.advisorMichael J. Pritchard
dc.description.degreeMaster of Science
dc.description.departmentCollege of Technology and Aviation
dc.description.levelMasters
dc.identifier.urihttps://hdl.handle.net/2097/44989
dc.subjectKeystroke Dynamics
dc.subjectMachine Learning
dc.subjectSide Channel Attack
dc.subjectPersonal Identification Number Entry Device
dc.subjectCyptography
dc.subjectTiming
dc.titleTiming as a side-channel vulnerability: neural network analysis of generalized PIN prediction
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
MasonClendenen2025.pdf
Size:
1.46 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.65 KB
Format:
Item-specific license agreed upon to submission
Description: