Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Survey on Acoustic Side Channel Attacks on Keyboards

Published 20 Sep 2023 in cs.CR | (2309.11012v2)

Abstract: Most electronic devices utilize mechanical keyboards to receive inputs, including sensitive information such as authentication credentials, personal and private data, emails, plans, etc. However, these systems are susceptible to acoustic side-channel attacks. Researchers have successfully developed methods that can extract typed keystrokes from ambient noise. As the prevalence of keyboard-based input systems continues to expand across various computing platforms, and with the improvement of microphone technology, the potential vulnerability to acoustic side-channel attacks also increases. This survey paper thoroughly reviews existing research, explaining why such attacks are feasible, the applicable threat models, and the methodologies employed to launch and enhance these attacks.

Citations (3)

Summary

  • The paper demonstrates that acoustic side-channel vulnerabilities in keyboards can be exploited via timing, frequency, and geometry-based techniques.
  • It evaluates various recording media and keyboard types, highlighting the susceptibility of mechanical keyboards to sound-based attacks.
  • The study underscores the urgent need for robust countermeasures to protect data integrity in keyboard input systems.

Acoustic Side-Channel Attacks on Keyboards: An Exploration of Vulnerability

Introduction

The study of acoustic side-channel attacks on keyboards highlights a significant vulnerability in security systems, wherein attackers exploit sound emanations produced during keystrokes to decipher sensitive information. With advancements in technology, particularly microphone enhancements, the feasibility and accuracy of these attacks have increased. This essay provides an in-depth analysis of existing research, exploring attack methodologies, threat models, and potential countermeasures within the domain of keyboard-based acoustic side-channel attacks.

Feasibility of Acoustic Side-Channel Attacks

Acoustic side-channel attacks exploit the unique sounds generated when keys on a mechanical keyboard are pressed. The feasibility of these attacks derives from two main factors: the physical acoustics of keyboards and the typing styles of individuals.

Distinct sounds arise from the structural differences between keys, with factors such as key pressure and angle contributing to sound variability (Figure 1). These attributes, combined with the typing habits of users, create possibilities for differentiating keystrokes from recorded acoustic data. Figure 1

Figure 1

Figure 1

Figure 1

Figure 1: Examples of Physical Proximity scenarios.

In practice, attackers can record keystroke sounds in scenarios involving close physical proximity or indirect remote access. For instance, an adversary might leave a hidden microphone near a victim's workspace or utilize remote software vulnerabilities to capture ambient sounds during VoIP calls. The emergence of powerful mobile microphones has further facilitated these remote attacks (Figure 2). Figure 2

Figure 2

Figure 2

Figure 2: Examples of Remote indirect access.

Attack Surface and Methodologies

Recording Medium

The choice of recording medium greatly affects the success of acoustic side-channel attacks. Common recording devices include:

  • Off-the-shelf microphones: Effective when placed in quiet environments close to the keyboard.
  • Victim's device microphones: Require malware installation but can yield less noisy data.
  • Parabolic microphones: Allow recording from a distance but may require strategic placement. Figure 3

    Figure 3: Parabolic Microphone.

Keyboard Types

Different keyboard types exhibit varying degrees of vulnerability to acoustic side-channel attacks:

  • Mechanical Keyboards: Widely used for PCs and highly susceptible due to their louder keystrokes.
  • Virtual Keyboards: Used in mobile devices, also prone to attacks, especially when entered in specific sequences like PIN codes. Figure 4

    Figure 4: Virtual keyboards.

Attack Strategies

Researchers employ diverse strategies to extract data from acoustic signals, categorized broadly into timing-based, frequency-based, and geometry-based analyses.

Timing-Based Analysis Utilizing Hidden Markov Models (HMMs)

Drawing on timing information between keystrokes, HMMs are often used to model typing patterns. These models help in estimating keystroke timing sequences and predicting word forms based on inter-keystroke intervals (Figure 5). Figure 5

Figure 5: Illustration of a Hidden Markov Model (HMM) trace.

Frequency-Based Analysis Employing Signal Processing Techniques

Frequency-domain analyses typically involve transforming acoustic signals using FFT or cepstrum features, offering insights into the identification of keystroke sounds. Signal processing and machine learning techniques such as SVMs and neural networks enhance the classification accuracy of keystrokes derived from this data (Figure 6). Figure 6

Figure 6

Figure 6: Spectrograms depicting two distinct keystrokes.

Geometry-Based Approaches Leveraging TDoA and Triangulation

The TDoA method computes arrival times across multiple microphones to estimate keystroke position (Figure 7). Triangulation, often used in conjunction with TDoA, aids in accurate sound localization for keystroke identification. Figure 7

Figure 7

Figure 7: This is an illustration of the geometrical TDoA on a single phone and the theoretical key groups.

Post Processing Technologies

Conclusion

The survey of acoustic side-channel attacks on keyboards sheds light on significant vulnerabilities inherent in sound-based data transmission during keystrokes. The diverse attack methodologies examined herein demonstrate the pressing need for robust mitigation techniques to secure keyboard-based input systems. Through a deeper understanding of these attack vectors and their underlying principles, this research serves as a foundation for developing innovative security solutions aimed at safeguarding sensitive information against acoustic side-channel threats. Ensuring the integrity of data input mechanisms remains essential as researchers continue to explore defensive measures within this crucial domain.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.