2008
DOI: 10.1109/sp.2008.28
|View full text |Cite
|
Sign up to set email alerts
|

ClearShot: Eavesdropping on Keyboard Input from Video

Abstract: Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private information through side channels, such as the electromagnetic emissions of monitors or the sound produced by keyboards. While extracting the same information by watching somebody typing on a keyboard might seem to be an easy task, it becomes extremely challenging if it has to be automated. However, an automated tool is needed in the case of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(64 citation statements)
references
References 29 publications
0
64
0
Order By: Relevance
“…Some of the early work in this area rely on video footage filmed using a camera directly facing the screen or the keyboard [4,16]. Latest work shows that this limit can be lifted by exploiting spatial-temporal dynamics of the hands during typing [23].…”
Section: *Corresponding Authors: Zhanyong Tang and Zheng Wangmentioning
confidence: 99%
See 2 more Smart Citations
“…Some of the early work in this area rely on video footage filmed using a camera directly facing the screen or the keyboard [4,16]. Latest work shows that this limit can be lifted by exploiting spatial-temporal dynamics of the hands during typing [23].…”
Section: *Corresponding Authors: Zhanyong Tang and Zheng Wangmentioning
confidence: 99%
“…For example, Figure 2 (c) will be transformed to Figure 2 (d) to obtain a fingertip movement trajectory from the user's perspective. 4 Identify and Rank Candidate Patterns: In this step, our software automatically maps the tracked fingertip movement trajectory to a number of candidate patterns (Section IV-D). We rank the candidate patterns based on a heuristic described in Section IV-D2.…”
Section: Overview Of Our Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…This also provides malicious entities with a potential opportunity for observing the password entry. Such an attack could be accomplished either through casual non-technical attacks like shoulder surfing or sophisticated attacks such as Balzarotti, Cova, and Vigna's video based tech-nique [6] or the audio logging technique introduced by Zhuang, Zhou, and Tygar [7].…”
Section: Related Workmentioning
confidence: 99%
“…Regarding security, passwords evaluate to poor in security measures; they are not resilient to physical observation as they can be automatically observed by key loggers or through a high quality video recording of the keyboard [5]. Also, passwords are vulnerable to dictionary attacks and guessing attacks, not resilient to leaks from other verifiers and most importantly, they are not resilient to phishing attacks.…”
Section: Introductionmentioning
confidence: 99%