Published November 24, 2021 | Version v1
Dataset Open

Myo Keylogging Dataset

  • 1. Secure Mobile Networking Lab, Technical University of Darmstadt

Description

This record contains the Myo Keylogging Dataset from the paper "My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack" by Matthias Gazzari, Annemarie Mattmann, Max Maass and Matthias Hollick in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Volume 5, Issue 4, 2021.

The dataset contains sensor data from two Myo armbands recorded from volunteers typing predefined tasks on a physical keyboard (one worn on the left and the other worn on the right forearm). Additionally, the keystrokes and their timings are included along with metadata describing each individual recording. The dataset is split into two parts, each consisting of a series of recording sessions in the respective folder:

  1. Part One: train-data
    In the first part, the participants were instructed to type during a series of 24 tasks consisting of copying text, pangrams, random characters and playing a game. In our paper, we used this dataset for training our classifiers.
  2. Part Two: test-data
    In the second part, the participants were instructed to copy four different types of passwords, namely insecure common passwords, passphrases inspired by xkcd, pwgen generated pseudo-random passwords and random passwords. In our paper, we used this dataset to evaluate our classifiers.

Please refer to the README.md files in the respective folders and our paper for further details about the dataset and the data study.

Files

myo-keylogging-dataset.zip

Files (940.3 MB)

Name Size Download all
md5:84ee04d93e74018c493c35512b58a0ab
940.3 MB Preview Download

Additional details

Related works

Is documented by
10.1145/3494986 (DOI)
arXiv:2112.02382 (arXiv)
Is supplemented by
https://github.com/seemoo-lab/myo-keylogging (URL)