Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660296
|View full text |Cite
|
Sign up to set email alerts
|

Context-free Attacks Using Keyboard Acoustic Emanations

Abstract: The emanations of electronic and mechanical devices have raised serious privacy concerns. It proves possible for an attacker to recover the keystrokes by acoustic signal emanations. Most existing malicious applications adopt contextbased approaches, which assume that the typed texts are potentially correlated. Those approaches often incur a high cost during the context learning stage, and can be limited by randomly typed contents (e.g., passwords). Also, context correlations can increase the risk of successive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
73
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 132 publications
(77 citation statements)
references
References 35 publications
1
73
0
Order By: Relevance
“…Other than the SDRs based keystroke tracking approach proposed in [21] which uses wireless signals to track keystrokes, researchers have proposed several keystrokes recognition schemes that are based on other sensing modalities such as acoustics [1][2][3]22], electromagnetic emissions [4], and video cameras [5]. Next, we give a brief overview of the other existing schemes that utilize these sensing modalities to recognize keystrokes.…”
Section: Keystrokes Recognitionmentioning
confidence: 99%
See 2 more Smart Citations
“…Other than the SDRs based keystroke tracking approach proposed in [21] which uses wireless signals to track keystrokes, researchers have proposed several keystrokes recognition schemes that are based on other sensing modalities such as acoustics [1][2][3]22], electromagnetic emissions [4], and video cameras [5]. Next, we give a brief overview of the other existing schemes that utilize these sensing modalities to recognize keystrokes.…”
Section: Keystrokes Recognitionmentioning
confidence: 99%
“…They used cepstrum features [22] instead of FFT as keystroke features and used unsupervised learning with language model correction on the collected features before using them for supervised training and recognition of different keystrokes. Zhu et al proposed a context-free geometry-based approach for recognizing keystrokes that leverage the acoustic emanations from keystrokes to first calculate the time difference of keystroke arrival and then estimate the physical locations of the keystrokes to identify which keys are pressed [3].…”
Section: Keystrokes Recognitionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the proposed approach can only achieve 73% accuracy of inferring pattern and 43% accuracy of inferring PIN with only 50 PINs and 50 patterns. Acoustic Attacks and Tracking: Keystroke recognition based on the acoustic emanation has been studied in [8,13,19,30,38,39]. These approaches leverage the observation that the sound of keystrokes differs slightly from key to key or use time-difference of arrival measurements to identify multiple strokes of the same physical key.…”
Section: Related Workmentioning
confidence: 99%
“…It will do great harm to personal security and privacy if the content user's input is stolen. Except attacking the user's computer to get the information, criminals can also use acoustic ways, (35)(36)(37) electromagnetic emission 38 or the vision way. 39 WiKey 9 is a system which has the ability of identifying user's keystroke remotely only using Wi-Fi signals.…”
Section: Minute Motion Detectionmentioning
confidence: 99%