"Malboard: New Computer Attack Mimics User’s Keystroke Characteristics, and Evades Detection"
Researchers from Ben-Gurion University of the Negev's (BGU) Malware Lab developed a new user keystroke impersonation attack, called Malboard, to demonstrate the possibility of users' keystrokes being mimicked by attackers and the prevention of detecting malicious keystrokes. Malboard is capable of circumventing detection mechanisms used for the verification of user identities based on behavioral patterns with respect to keystrokes. The behavioral authentication systems that this attack was tested against include KeyTrac, TypingDNA, and DuckHunt. The keyboards used to demonstrate this attack are developed by Microsoft, Lenovo, and Dell. This article continues to discuss the concept and research behind the Malboard attack, as well as the new detection modules proposed by researchers and the expansion of this study.