Dictionary attacks using keyboard acoustic emanations

@inproceedings{Berger2006DictionaryAU,
  title={Dictionary attacks using keyboard acoustic emanations},
  author={Yigael Berger and Avishai Wool and Arie Yeredor},
  booktitle={CCS '06},
  year={2006}
}
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruct single words of 7-13 characters from a recording of the clicks made when typing them on a keyboard. Our attack does not require any training, and works on an individual recording of the typed word (may be under 5 seconds of sound). The attack is very efficient, taking under 20 seconds per word on a standard PC. We… 
A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques
TLDR
This work takes the keyboard acoustic attack one step further, bringing it closer to a full-fledged vulnerability under realistic scenarios (different typing styles and random passwords), and introduces a novel technique -- time-frequency decoding -- that improves the detection accuracy compared to previous techniques.
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
TLDR
This work investigates several existing signal processing techniques for keyboard acoustic attack and introduces a novel technique—time–frequency decoding—that improves the detection accuracy compared to previous techniques.
Acoustic attack on keyboard using spectrogram and neural network
TLDR
A compromise between the time and frequency domains is decided and acoustic trace measured in the time-frequency domain is processed by using a spectrogram based on a simple algorithm and does not use any other tool to improve classification results.
Cracking Passwords using Keyboard Acoustics and Language Modeling
This project looks at how user input can be reconstructed from an audio recording of a user typing. The keyboard acoustic attack outlined in [35] is fully reimplemented and a number of extensions to
Context-free Attacks Using Keyboard Acoustic Emanations
TLDR
This work uses off-the-shelf smartphones to record acoustic emanations from keystrokes and estimates keystroke' physical positions based on the Time Difference of Arrival (TDoA) method, and shows that more than 72.2\% of keystroked can be successfully recovered.
LOL: localization-free online keystroke tracking using acoustic signals
TLDR
This study presents a localization-free online keystroke tracking system (LOL), which enables people to use prior knowledge obtained from the keyboard in one location to recognize real-time keystrokes of the same type of keyboard in any other places, despite various background noises.
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses
TLDR
This paper introduces an offense-defense system that highlights the threat of a remote adversary eavesdropping on keystrokes while the victim is on a VoIP call, and builds a way to mask the leakage through the use of system-generated sounds.
I Know Your Keyboard Input: A Robust Keystroke Eavesdropper Based-on Acoustic Signals
  • Jia-Xuan Bai, Bin Liu, Luchuan Song
  • Computer Science
    ACM Multimedia
  • 2021
TLDR
A robust side-channel attack scheme to infer keystrokes on the surrounding keyboard, leveraging the smart devices' microphones, and extract two robust features from the acoustic signals to alleviate the impact of various victims and keyboards is proposed.
Identification of Pressed Keys by Acoustic Transfer Function
TLDR
It is shown that the Acoustic Transfer Function (ATF) of the device carries information that discloses the pressed key and that the certification process has failed in identifying this vulnerability.
Acoustic Cryptanalysis
TLDR
A new acoustic cryptanalysis key extraction attack, applicable to GnuPG’s implementation of RSA, that can extract full 4096-bit RSA decryption keys from laptop computers, within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 16 REFERENCES
Keyboard acoustic emanations revisited
TLDR
A novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and then recovering up to 96% of typed characters, without any need for a labeled training recording is presented.
Keyboard acoustic emanations
We show that PC keyboards, notebook keyboards, telephone and ATM pads are vulnerable to attacks based on differentiating the sound emanated by different keys. Our attack employs a neural network to
Timing Analysis of Keystrokes and Timing Attacks on SSH
TLDR
A statistical study of users' typing patterns is performed and it is shown that these patterns reveal information about the keys typed, and that timing leaks open a new set of security risks, and hence caution must be taken when designing this type of protocol.
Foiling the cracker: A survey of, and improvements to, password security
TLDR
Some of the problems of current password security are outlined by demonstrating the ease by which individual accounts may be broken, and one solution to this point of system vulnerability, a proactive password checker is proposed.
Compromising emanations: eavesdropping risks of computer displays
TLDR
A proposal for a civilian radio-frequency emission-security standard is outlined, based on path-loss estimates and published data about radio noise levels, and a new optical eavesdropping technique is demonstrated that reads CRT displays at a distance.
Information leakage from optical emanations
TLDR
A taxonomy of compromising optical emanations is developed, and design changes are described that will successfully block this kind of "Optical Tempest" attack.
The Earth Mover's Distance as a Metric for Image Retrieval
TLDR
This paper investigates the properties of a metric between two distributions, the Earth Mover's Distance (EMD), for content-based image retrieval, and compares the retrieval performance of the EMD with that of other distances.
Scowl - spell checker oriented word lists, 2004. http://wordlist.sourceforge.net
  • 2004
Scowl -spell checker oriented word lists
  • Scowl -spell checker oriented word lists
  • 2004
Auditory toolbox
  • Auditory toolbox
  • 1998
...
1
2
...