New Acoustic Attacks Decipher Keystrokes in Any Environment

by | Mar 19, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A groundbreaking study by researchers Alireza Taheritajar and Reza Rahaeimehr from Augusta University in the U.S. has revealed a novel acoustic side-channel attack targeting keyboards, capable of deducing user input by analyzing typing patterns, even amidst challenging conditions such as noisy environments.

While achieving an average success rate of 43%, which is notably lower compared to previous methods, this innovative approach eliminates the necessity for controlled recording settings or specific typing platforms, rendering it more adaptable in real-world attack scenarios. Depending on certain target-specific parameters, it can yield sufficient reliable data to decipher the overall input of the target with subsequent post-capture analysis.

Comparison tableComparison table (arxiv.org)

Acoustic Attack Technique

The technique, detailed in a technical paper published by the researchers, capitalizes on the unique sound emissions of different keystrokes and user typing patterns, captured through specialized software to compile a comprehensive dataset. Crucially, gathering typing samples from the target allows for correlation between specific keystrokes and associated sound waves.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

While the paper explores various methods for capturing text, potential avenues include malware, malicious websites or browser extensions, compromised applications, cross-site scripting, or compromised USB keyboards. Typing may be recorded using a concealed microphone in proximity to the target or remotely via compromised devices such as smartphones, laptops, or smart speakers.

Extracted keystroke waveformsExtracted keystroke waveforms (arxiv.org)

The compiled dataset encompasses typing samples under diverse conditions, necessitating recording of multiple typing sessions to bolster the success of the attack. However, the researchers emphasize that the dataset need not be excessively large.

Subsequently, a statistical model is trained on the dataset to construct a detailed profile of the target’s individual typing patterns, primarily based on time intervals between keystrokes.

Calculating the time intervalsCalculating the time intervals (arxiv.org)

Maintaining a tolerance of 5% deviation in the statistical model proves crucial, as typing behavior exhibits slight variance even when typing the same word repeatedly.




To predict typed text, the method analyzes audio recordings of keyboard activity, refining predictions through filtering via an English dictionary. Remarkably, the attack can achieve a typing prediction accuracy of 43% on average, even amidst challenges such as environmental noise, usage of different keyboard models, low-quality microphone recordings, and diverse typing styles.

However, the method does have limitations that may render the attack ineffective in certain scenarios. Individuals with inconsistent typing patterns, such as infrequent computer users or professional typists with rapid typing speeds, may pose challenges to profiling. Test results on 20 subjects demonstrated a wide range of success rates, highlighting variances in predictability among different individuals.

Overall resultsOverall results (arxiv.org)

Furthermore, the researchers observed that the effectiveness of the prediction model is compromised when using silent keyboards, as the produced waveform amplitude is less pronounced. This factor may hinder training effectiveness and lower keystroke detection rates.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This