ABSTRACT
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of Channel State Information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal based keystroke recognition system called WiKey. WiKey consists of two Commercial Off-The-Shelf (COTS) WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves more than 97.5\% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%.
- Dmitri Asonov and Rakesh Agrawal. Keyboard acoustic emanations. In 2012 IEEE Symposium on Security and Privacy, pages 3--3. IEEE Computer Society, 2004.Google Scholar
- Li Zhuang, Feng Zhou, and J Doug Tygar. Keyboard acoustic emanations revisited. ACM Transactions on Information and System Security (TISSEC), 13(1):3, 2009. Google ScholarDigital Library
- Tong Zhu, Qiang Ma, Shanfeng Zhang, and Yunhao Liu. Context-free attacks using keyboard acoustic emanations. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 453--464. ACM, 2014. Google ScholarDigital Library
- Martin Vuagnoux and Sylvain Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium, pages 1--16, 2009. Google ScholarDigital Library
- Davide Balzarotti, Marco Cova, and Giovanni Vigna. Clearshot: Eavesdropping on keyboard input from video. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 170--183. IEEE, 2008. Google ScholarDigital Library
- Chunmei Han, Kaishun Wu, Yuxi Wang, and Lionel M Ni. Wifall: Device-free fall detection by wireless networks. In INFOCOM, 2014 Proceedings IEEE, pages 271--279. IEEE, 2014.Google ScholarCross Ref
- Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, and Hongbo Liu. E-eyes: device-free location-oriented activity identification using fine-grained wifi signatures. In Proceedings of the 20th annual international conference on Mobile computing and networking, pages 617--628. ACM, 2014. Google ScholarDigital Library
- Zimu Zhou, Zheng Yang, Chenshu Wu, Longfei Shangguan, and Yunhao Liu. Towards omnidirectional passive human detection. In INFOCOM, 2013 Proceedings IEEE, pages 3057--3065. IEEE, 2013.Google ScholarCross Ref
- Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, and Zhiping Jiang. Electronic frog eye: Counting crowd using wifi. In INFOCOM, 2014 Proceedings IEEE, pages 361--369, April 2014.Google ScholarCross Ref
- Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, and Lionel M Ni. We can hear you with wi-fi! In Proceedings of the 20th annual international conference on Mobile computing and networking, pages 593--604. ACM, 2014. Google ScholarDigital Library
- Stephan Sigg, Shuyu Shi, Felix Buesching, Yusheng Ji, and Lars Wolf. Leveraging rf-channel fluctuation for activity recognition: Active and passive systems, continuous and rssi-based signal features. In Proceedings of International Conference on Advances in Mobile Computing & Multimedia, page 43. ACM, 2013. Google ScholarDigital Library
- Stephan Sigg, Markus Scholz, Shuyu Shi, Yusheng Ji, and Michael Beigl. Rf-sensing of activities from non-cooperative subjects in device-free recognition systems using ambient and local signals. Mobile Computing, IEEE Transactions on, 13(4):907--920, 2014. Google ScholarDigital Library
- Rajalakshmi Nandakumar, Bryce Kellogg, and Shyamnath Gollakota. Wi-fi gesture recognition on existing devices. arXiv preprint arXiv:1411.5394, 2014.Google Scholar
- Souvik Sen, Jeongkeun Lee, Kyu-Han Kim, and Paul Congdon. Avoiding multipath to revive inbuilding wifi localization. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pages 249--262. ACM, 2013. Google ScholarDigital Library
- Jiang Xiao, Kaishun Wu, Youwen Yi, and Lionel M Ni. Fifs: Fine-grained indoor fingerprinting system. In Computer Communications and Networks (ICCCN), 2012 21st International Conference on, pages 1--7. IEEE, 2012.Google ScholarCross Ref
- Zheng Yang, Zimu Zhou, and Yunhao Liu. From rssi to csi: Indoor localization via channel response. ACM Computing Surveys (CSUR), 46(2):25, 2013. Google ScholarDigital Library
- Qifan Pu, Sidhant Gupta, Shyamnath Gollakota, and Shwetak Patel. Whole-home gesture recognition using wireless signals. In Proceedings of the 19th annual international conference on Mobile computing & networking, pages 27--38. ACM, 2013. Google ScholarDigital Library
- Bryce Kellogg, Vamsi Talla, and Shyamnath Gollakota. Bringing gesture recognition to all devices. In Usenix NSDI, volume 14, 2014. Google ScholarDigital Library
- Bastien Lyonnet, Cornel Ioana, and Moeness G Amin. Human gait classification using microdoppler time-frequency signal representations. In Radar Conference, 2010 IEEE, pages 915--919. IEEE, 2010.Google ScholarCross Ref
- Fadel Adib, Zach Kabelac, Dina Katabi, and Robert C Miller. 3d tracking via body radio reflections. In Usenix NSDI, volume 14, 2013. Google ScholarDigital Library
- Bo Chen, Vivek Yenamandra, and Kannan Srinivasan. Tracking keystrokes using wireless signals. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pages 31--44. ACM, 2015. Google ScholarDigital Library
- Donald G Childers, David P Skinner, and Robert C Kemerait. The cepstrum: A guide to processing. Proceedings of the IEEE, 65(10):1428--1443, 1977.Google ScholarCross Ref
- Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 802.11 with multiple antennas for dummies. ACM SIGCOMM Computer Communication Review, 40(1):19--25, 2010. Google ScholarDigital Library
- Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. Tool release: gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review, 41(1):53--53, 2011. Google ScholarDigital Library
- Meinard Müller. Dynamic time warping. Information retrieval for music and motion, pages 69--84, 2007.Google ScholarCross Ref
- Jyh-Shing Roger Jang. Machine learning toolbox, available at http://mirlab.org/jang/matlab/toolbox/machinelearning, accessed on december 23, 2014.Google Scholar
- Neal Patwari and Sneha K Kasera. Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 111--122. ACM, 2007. Google ScholarDigital Library
- Neal Patwari and Sneha K Kasera. Temporal link signature measurements for location distinction. Mobile Computing, IEEE Transactions on, 10(3):449--462, 2011. Google ScholarDigital Library
Index Terms
- Keystroke Recognition Using WiFi Signals
Recommendations
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityIn this study, we present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi-based side-channel information. WindTalker is motivated from the ...
Practical identity recognition using wifi's channel state information
DATE '22: Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in EuropeIdentity recognition is increasingly used to control access to sensitive data, restricted areas in industrial, healthcare, and defense settings, as well as in consumer electronics. To this end, existing approaches are typically based on collecting and ...
Exact Error Rate Analysis of MIMO-MRC System under Cochannel Interference and Imperfect Channel State Information
In this paper, we derive closed-form solution for the bit error rate of multi-input multi-output (MIMO) system with maximum ratio combining. We consider binary PSK modulation suffers from cochannel interference (CCI) and imperfect channel state ...
Comments