2000 character limit reached
Acoustic Side Channel Attack on Keyboards Based on Typing Patterns (2403.08740v1)
Published 13 Mar 2024 in cs.CR
Abstract: Acoustic side-channel attacks on keyboards can bypass security measures in many systems that use keyboards as one of the input devices. These attacks aim to reveal users' sensitive information by targeting the sounds made by their keyboards as they type. Most existing approaches in this field ignore the negative impacts of typing patterns and environmental noise in their results. This paper seeks to address these shortcomings by proposing an applicable method that takes into account the user's typing pattern in a realistic environment. Our method achieved an average success rate of 43% across all our case studies when considering real-world scenarios.
- S Abhishek Anand and Nitesh Saxena. 2018. Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. 103–110.
- Dmitri Asonov and Rakesh Agrawal. 2004. Keyboard acoustic emanations revisited. In Proceedings of the 11th ACM conference on Computer and communications security. ACM, 373–382.
- Acoustic side-channel attacks on touchscreens. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. ACM, 551–562.
- Acoustic {{\{{Side-Channel}}\}} attacks on printers. In 19th USENIX Security Symposium (USENIX Security 10).
- Dictionary attacks using keyboard acoustic emanations. In Proceedings of the 13th ACM conference on Computer and communications security. 245–254.
- Roland Briol. 1991. Emanation: How to keep your data confidential. In Proceedings of Symposium on Electromagnetic Security For Information Protection. 225–234.
- Language models are few-shot learners. Advances in neural information processing systems 33 (2020), 1877–1901.
- Don’t skype & type! acoustic eavesdropping in voice-over-ip. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 703–715.
- Gerson de Souza Faria and Hae Yong Kim. 2019. Differential audio analysis: a new side-channel attack on PIN pads. International Journal of Information Security 18 (2019), 73–84.
- Au Hiu Yan Fiona. 2006. Keyboard acoustic triangulation attack. The Chinese University Of Hong Kong: bachelors thesis (2006).
- Denis Foo Kune and Yongdae Kim. 2010. Timing attacks on pin input devices. In Proceedings of the 17th ACM conference on Computer and communications security. 678–680.
- RSA key extraction via low-bandwidth acoustic cryptanalysis. In 23rd USENIX Security Symposium. USENIX Association, 575–590.
- Tzipora Halevi and Nitesh Saxena. 2012. A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 89–90.
- A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 270–280.
- Ximing LIU. 2019. When keystroke meets password: Attacks and defenses. Dissertations and Theses Collection (2019).
- When human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers & Security 80 (2019), 90–107.
- Acoustic location of smartphones. In Proceedings of the 15th international conference on Mobile and ubiquitous multimedia. ACM, 307–311.
- Sravanthi Ponnam. 2013. Keyboard Acoustic Emanations Attack: An Empirical study.
- Acoustic side-channel attacks on printers. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1938–1952.
- Acoustic side channel attack on atm keypads.
- Stronger Password Authentication Using Browser Extensions.. In USENIX Security Symposium, Vol. 17. Baltimore, MD, USA, 32.
- Robust keystroke transcription from the acoustic side-channel. In Proceedings of the 35th Annual Computer Security Applications Conference. 776–787.
- Timing Analysis of Keystrokes and Timing Attacks on {{\{{SSH}}\}}. In 10th USENIX Security Symposium (USENIX Security 01).
- A Survey on Acoustic Side Channel Attacks on Keyboards. arXiv preprint arXiv:2309.11012 (2023).
- An acoustic side channel attack on enigma. School of Computing Science Technical Report Series (2015).
- Password memorability and security: Empirical results. IEEE Security & privacy 2, 5 (2004), 25–31.
- Context-free attacks using keyboard acoustic emanations. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 453–464.
- Keyboard acoustic emanations revisited. ACM Transactions on Information and System Security (TISSEC) 13, 1 (2009), 1–26.