QUACK! Making the (Rubber) Ducky Talk: A Systematic Study of Keystroke Dynamics for HID Injection Detection
Alessandro Lotto, Francesco Marchiori, Mauro Conti
TLDR
This paper systematically studies keystroke dynamics to detect automated HID injection attacks, distinguishing human from machine input without user profiling.
Key contributions
- Systematically characterizes keystroke dynamics for human-vs-machine HID injection detection.
- Achieves robust, privacy-preserving detection using lightweight models on timing features only.
- Finds attacker sophistication doesn't guarantee evasion; diverse generation strategies are key.
- Quantifies timeliness-reliability trade-off for practical, early attack interception.
Why it matters
Modern systems are vulnerable to HID injection attacks, which bypass traditional defenses. This paper provides a robust, privacy-preserving method using keystroke dynamics to detect these attacks, significantly improving system security.
Original Abstract
Modern computing systems inherently trust human input devices, creating an exploitable attack surface for adversarial automation. USB Human Interface Device (HID) emulation attacks, such as those enabled by the USB Rubber Ducky, exploit this assumption to inject arbitrary keystroke sequences while bypassing traditional defenses. Existing countermeasures rely on simple heuristics based on typing speed or timing regularity, which can be easily evaded through basic randomization. Keystroke dynamics analysis offers a more robust alternative by modeling temporal typing behavior. However, prior work frames this problem as behavioral authentication, verifying whether input originates from a specific user rather than detecting automated injection. An alternative approach is continuous monitoring via keylogging integrated with intrusion detection systems, but this requires access to input content, raising significant privacy concerns. In this paper, we provide the first systematic characterization of keystroke dynamics for human-vs-machine discrimination, independent of user identity. Guided by five research questions, we show that robust, privacy-preserving detection is achievable using lightweight models operating solely on timing features, eliminating the need for content access or user profiling. Our analysis reveals that attacker sophistication does not monotonically translate into improved evasion. Instead, robustness depends on exposure to structurally diverse generation strategies rather than increased model complexity. Finally, we quantify the trade-off between detection timeliness and reliability across varying keystroke sequence lengths, identifying practical operating points for early and effective attack interception.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.