Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelometers
This study explores the ability of mobile phone accelerometers to detect and reconstruct keystrokes from nearby keyboards based on vibration analysis. By employing neural networks and dictionaries, researchers demonstrate how accelerometers can leak sensitive information and the implications for data security. The research highlights challenges, suggestions for secure sensor access, and the necessity for protocols to protect against potential attacks. As mobile phone sensors become more sophisticated, understanding their vulnerabilities is crucial for enhancing privacy protection.
Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelometers
E N D
Presentation Transcript
Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelometers Philip Marquardt(MIT Lincoln Laboratory) Arunabh VermaHenry CarterPatrick Traynor(Georgia Institute of Technology)
INTRODUCTION • In 90s - • No Web browser • No Email Client • Low Processing Power • No Sensors • In 2012 - • Competent with Desktops • Browsers with Flash support • Sophisticated Sensors
ACCELEROMETERS • Accelerometers can be used to leak unintended significant information from user’s environment. • Keypresses made on a nearby keyboard can be recorded and reconstructed on the basis of vibrations. • Neural Network used to develop profiles for keypress events. • Dictionaries used to to recover words from the translated content.
MOTIVATION • Use of emanations of electrical and mechanical devices to expose information. • Electro-magnetic emanations enabled Data recovery from CRT and LCDs. • Similar attacks on emanations from Smart Cards, CMOS Chips, Serial port cables and keyboards. • Acoustic emanations made by devices easily captured by less capable adversaries.
EXPERIMENTAL SETUP • Can keypresses be detected by present Sensors? • Can previously developed methodology be applied to identify keystrokes? • iPhone 4 • Apple A1255 Wireless Bluetooth keyboard • Phone and Accelerometer • Signal Processing (Matlab’s FFT) • RapidMiner/Machine Learning
MODELLING • Keypress Event Modeling • Low Sampling rate of accelerometer • Difficult to characterize individual keys • Characterize pairs of key presses by defining a relation • Relation b/w two successive keypresses Pi, Pj using two features • Horizontal Orientation : loc(Pi) • Distance between Consecutive KeyPresses : dist (Pi, Pj)
Contd.. • We define consecutive keypress events as rel(Pi, Pj) = loc(Pi)||loc(Pj)||dist(Pi, Pj), where || represents feature concatenation. • Eg: “canoe” • ca : LLN • An : LRF • no : RRF • oe : RLF “canoe” = LLN.LRF.RRF.RLF
LEARNING PHASE • Data Collection • Keys A to Z pressed 150 times randomly • 3900 distinct key press events • Feature Extraction • Define a feature vector for every key stroke containing time-domain and frequency domain features • FV (Pi)= <mean, kurtosis, variance, min, max, energy, rms, mfccs, fft> • Word Labeling • Train the model using a dictionary • Each word in the training dictionary is broken down into its constituent characters and character-pairs.
ATTACK PHASE • Data Collection • Feature extraction • Key-Press Classification • Word matching • The word matcher takes each predicted word profile of length n-1 and assigns a score against each word in the dictionary with length n.
EXPERIMENTAL RESULTS 2 Test Sentence – First ten sentences from “Harvard Sentences” Dictionary– Same ten sentences.
CHALLENGES and LIMITATIONS • Recognition versus Distance – Small increase in distance drastically decreases the effectiveness of attack. • Orientation of Monitoring Device • Possible ambient vibrations (including typing speed) • Characteristics of the desk surface
CONCLUSION • The first level of security within smart phone is at the level of Operating System. • Powerful sensors present in Mobile Phones can be utilized for recovering data from nearby keyboard. • Thus, access to sensors must be carefully monitored and regulated to overcome the security hazards. • Concrete protocols must be enforced for authenticated access of sensors by applications.
THANK YOU !! Ravikanth Safina Srinivas