“…Bearing no need to have a visual on the target screen, the indirect attacks often incur a much higher risk as they leverage side-channels to infer passwords in a stealthy manner. Typical side-channels considered by prior works include acoustic [36,73], electromagnetic emission [31], indirect vision [11,53,57,69], and motion sensors [9,37,43]. Though they have demonstrated successes for particular scenarios, these successes often rely on strong assumptions [34], including i) eavesdropping devices are in proximity to the victim device (e.g., in centimeter scale or within line-of-sight region) [11,31,36,37,43,53], ii) rogue software have been implanted to the victim device [9,37,73], and iii) the content to eavesdrop has linguistic structure [2,37,43,69].…”