skip to main content
research-article

A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques

Published: 02 May 2012 Publication History

Abstract

We take a closer look at keyboard acoustic emanations specifically for the purpose of eavesdropping over random passwords. In this scenario, dictionary and HMM language models are not applicable; the attacker can only utilize the raw acoustic information which has been recorded. We investigate several existing signal processing techniques for our purpose, and introduce a novel technique -- time-frequency decoding -- that improves the detection accuracy compared to previous techniques. We also carefully examine the effect of typing style -- a crucial variable largely ignored by prior research -- on the detection accuracy. Our results show that using the same typing style (hunt and peck) for both training and decoding the data, the best case success rate for detecting correctly the typed key is 64% per character. The results also show that changing the typing style, to touch typing, during the decoding stage reduces the success rate, but using the time-frequency technique, we can still achieve a success rate of around 40% per character.
Our work takes the keyboard acoustic attack one step further, bringing it closer to a full-fledged vulnerability under realistic scenarios (different typing styles and random passwords). Our results suggest that while the performance of these attacks degrades under such conditions, it is still possible, utilizing the time-frequency technique, to considerably reduce the exhaustive search complexity of retrieving a random password.

References

[1]
D. Asonov and R. Agrawal. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy, 2004.
[2]
Y. Berger, A. Wool and A. Yeredor, Dictionary Attacks Using Keyboard Acoustic Emanations. In Conference on Computer and Communications Security, SESSION: Attacks and cryptanalysis, Pages: 245--254, 2006.
[3]
P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In CHI '10: Proceedings of the 28th international conference on Human factors in computing systems, pages 383--392, 2010.
[4]
A. Moore, School of Computer Science, Carnegie Mellon University. Hidden Markov Model. http://www.autonlab.org/tutorials/hmm14.pdf.
[5]
"Keyboard Acoustic Emanations Revisited" presentation. http://cs.unc.edu/~fabian/courses/CS600.624/slides/emanations.pdf.
[6]
Typing. Wikipedia, available at http://en.wikipedia.org/wiki/Typing.
[7]
R. Shay, S. Komanduri, K. G. Patrick, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin and L. F. Cranor. Encountering stronger password requirements: user attitudes and behaviors In SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010.
[8]
A. Wool and Y. Berger. Personal communication on the subject of typing styles used in prior research on keyboard acoustic emanations. April, 2010.
[9]
L. Zhuang, F. Zhou, J. D. Tygar, Keyboard Acoustic Emanations Revisited. In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp. 373--382.
[10]
L. Zhuang, F. Zhou, J. D. Tygar, Keyboard Acoustic Emanations Revisited. In ACM Transactions on Information and System Security (TISSEC), October 2009, Volume 13 Issue 1, pp. 3--26.

Cited By

View all
  • (2024)Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet TransformMachine Learning for Cyber Security10.1007/978-981-97-2458-1_1(1-16)Online publication date: 23-Apr-2024
  • (2023)A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00034(270-280)Online publication date: Jul-2023
  • (2022)BPLMSBT: Blockchain-Based Permission List for Mitigating the Sensor-Based Threats on SmartphonesIEEE Sensors Journal10.1109/JSEN.2022.316789322:11(11075-11087)Online publication date: 1-Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
May 2012
119 pages
ISBN:9781450316484
DOI:10.1145/2414456
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. keyboard acoustic emanations
  2. random passwords
  3. signal processing

Qualifiers

  • Research-article

Conference

ASIA CCS '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)5
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet TransformMachine Learning for Cyber Security10.1007/978-981-97-2458-1_1(1-16)Online publication date: 23-Apr-2024
  • (2023)A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00034(270-280)Online publication date: Jul-2023
  • (2022)BPLMSBT: Blockchain-Based Permission List for Mitigating the Sensor-Based Threats on SmartphonesIEEE Sensors Journal10.1109/JSEN.2022.316789322:11(11075-11087)Online publication date: 1-Jun-2022
  • (2022)SBTDDLComputers and Security10.1016/j.cose.2022.102729118:COnline publication date: 1-Jul-2022
  • (2022)STMAD: sensor-based threat’s mitigation on smartphones using allowlist and denylistThe Journal of Supercomputing10.1007/s11227-022-04523-278:14(16336-16363)Online publication date: 4-May-2022
  • (2022)We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN PadsComputer Security – ESORICS 202210.1007/978-3-031-17140-6_31(633-652)Online publication date: 25-Sep-2022
  • (2021)Security and Privacy in the Emerging Cyber-Physical World: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.308145023:3(1879-1919)Online publication date: Nov-2022
  • (2021)A Survey on Sensor-Based Threats and Attacks to Smart Devices and ApplicationsIEEE Communications Surveys & Tutorials10.1109/COMST.2021.306450723:2(1125-1159)Online publication date: Oct-2022
  • (2020)A Context-Aware Framework for Detecting Sensor-Based Threats on Smart DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2019.289325319:2(245-261)Online publication date: 1-Feb-2020
  • (2020)Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio LeakageComputer Security – ESORICS 202010.1007/978-3-030-58951-6_35(720-735)Online publication date: 12-Sep-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media