Skip to main content
Top
Published in: Soft Computing 21/2019

23-11-2018 | Methodologies and Application

LOL: localization-free online keystroke tracking using acoustic signals

Authors: Zhenquan Qin, Jiaxin Du, Guangjie Han, Gaopeng Yong, Linlin Guo, Lei Wang

Published in: Soft Computing | Issue 21/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Contents typed via keyboards prove to be vulnerable to attacks based on acoustic emanations analysis. However, previous works achieve the attacks under controlled environment, e.g., neglecting the noises or requiring the keyboard to be located in fixed locations. In this study, we present a localization-free online keystroke tracking system (LOL), which enables people to use prior knowledge obtained from the keyboard in one location to recognize real-time keystrokes of the same type of keyboard in any other places, despite various background noises. Combined with support vector machine, we design an detection model to separate keystroke signals from noises. By analyzing the properties of acoustics transmission, we propose an angle-based sampling method with a single microphone to decrease the dependence on certain locations, and it also increases the diversity of signals in the meantime. Our real-world experiments demonstrate a 99.47% keystroke detection rate, a 97.27% recognition accuracy under ideal condition, and an 84.55% content recovery accuracy despite changing locations of the keyboard. Most commercial off-the-shelf sound recording devices, e.g., smartphones, can be used in our system to record acoustic emanations from keystrokes. LOL could attract more community to study security of keyboard devices and promote users to enhance privacy protection awareness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ali K, Liu AX, Wang W, Shahzad M (2015) Keystroke recognition using wifi signals. In: ACM MobiCom Ali K, Liu AX, Wang W, Shahzad M (2015) Keystroke recognition using wifi signals. In: ACM MobiCom
go back to reference Ali K, Liu AX, Wang W, Shahzad M (2017) Recognizing keystrokes using WiFi devices. IEEE J Sel Areas Commun PP(99): 1–1 Ali K, Liu AX, Wang W, Shahzad M (2017) Recognizing keystrokes using WiFi devices. IEEE J Sel Areas Commun PP(99): 1–1
go back to reference Asonov D, Agrawal R (2004) Keyboard acoustic emanations. In: IEEE symposium on security and privacy Asonov D, Agrawal R (2004) Keyboard acoustic emanations. In: IEEE symposium on security and privacy
go back to reference Baynath P, Soyjaudah KMS, Khan HM (2017) Keystroke recognition using neural network. In: International symposium on computational and business intelligence, pp 86–90 Baynath P, Soyjaudah KMS, Khan HM (2017) Keystroke recognition using neural network. In: International symposium on computational and business intelligence, pp 86–90
go back to reference Berger Y, Wool A, Yeredor A (2006) Dictionary attacks using keyboard acoustic emanations. In: ACM CCS Berger Y, Wool A, Yeredor A (2006) Dictionary attacks using keyboard acoustic emanations. In: ACM CCS
go back to reference Chen B, Yenamandra V, Srinivasan K (2015) Tracking keystrokes using wireless signals. In: ACM MobiSys Chen B, Yenamandra V, Srinivasan K (2015) Tracking keystrokes using wireless signals. In: ACM MobiSys
go back to reference Chen H, Li F, Wang Y (2017) Echotrack: acoustic device-free hand tracking on smart phones. In: IEEE INFOCOM Chen H, Li F, Wang Y (2017) Echotrack: acoustic device-free hand tracking on smart phones. In: IEEE INFOCOM
go back to reference Li F, Wang X, Chen H, Sharif K, Wang Y (2017) Clickleak: keystroke leaks through multimodal sensors in cyber-physical social networks. IEEE Access 5:27311–27321CrossRef Li F, Wang X, Chen H, Sharif K, Wang Y (2017) Clickleak: keystroke leaks through multimodal sensors in cyber-physical social networks. IEEE Access 5:27311–27321CrossRef
go back to reference Li M, Meng Y, Liu J, Zhu H, Liang X, Liu Y, Ruan N (2016) When CSI meets public WiFi: inferring your mobile phone password via WiFi signals. In: ACM CCS Li M, Meng Y, Liu J, Zhu H, Liang X, Liu Y, Ruan N (2016) When CSI meets public WiFi: inferring your mobile phone password via WiFi signals. In: ACM CCS
go back to reference Liu J, Wang Y, Kar G, Chen Y, Yang J, Gruteser M (2015) Snooping keystrokes with mm-level audio ranging on a single phone. In: ACM MobiCom Liu J, Wang Y, Kar G, Chen Y, Yang J, Gruteser M (2015) Snooping keystrokes with mm-level audio ranging on a single phone. In: ACM MobiCom
go back to reference Liu X, Zhou Z, Diao W, Li Z, Zhang K (2015) When good becomes evil: keystroke inference with smartwatch. In: ACM CCS Liu X, Zhou Z, Diao W, Li Z, Zhang K (2015) When good becomes evil: keystroke inference with smartwatch. In: ACM CCS
go back to reference Maiti A, Armbruster O, Jadliwala M, He J (2016) Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: ACM CCS Maiti A, Armbruster O, Jadliwala M, He J (2016) Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: ACM CCS
go back to reference Mao W, He J, Qiu L (2016) CAT: high-precision acoustic motion tracking. In: ACM MobiCom Mao W, He J, Qiu L (2016) CAT: high-precision acoustic motion tracking. In: ACM MobiCom
go back to reference Marquardt P, Verma A, Carter H, Traynor P (2011) (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: ACM CCS Marquardt P, Verma A, Carter H, Traynor P (2011) (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: ACM CCS
go back to reference Miluzzo E, Varshavsky A, Balakrishnan S, Choudhury RR (2012) Tapprints: your finger taps have fingerprints. In: ACM MobiSys Miluzzo E, Varshavsky A, Balakrishnan S, Choudhury RR (2012) Tapprints: your finger taps have fingerprints. In: ACM MobiSys
go back to reference Nirjon S, Gummeson J, Gelb D, Kim KH (2015) Typingring: a wearable ring platform for text input. In: ACM MobiSys Nirjon S, Gummeson J, Gelb D, Kim KH (2015) Typingring: a wearable ring platform for text input. In: ACM MobiSys
go back to reference Raguram R, White AM, Goswami D, Monrose F, Frahm JM (2011) ispy: automatic reconstruction of typed input from compromising reflections. In: ACM CCS Raguram R, White AM, Goswami D, Monrose F, Frahm JM (2011) ispy: automatic reconstruction of typed input from compromising reflections. In: ACM CCS
go back to reference Shukla D, Kumar R, Serwadda A, Phoha VV (2014) Beware, your hands reveal your secrets! In: ACM CCS Shukla D, Kumar R, Serwadda A, Phoha VV (2014) Beware, your hands reveal your secrets! In: ACM CCS
go back to reference Wang H, Lai TTT, Roy Choudhury R (2015) Mole: motion leaks through smartwatch sensors. In: ACM MobiCom Wang H, Lai TTT, Roy Choudhury R (2015) Mole: motion leaks through smartwatch sensors. In: ACM MobiCom
go back to reference Wang J, Ruby R, Wang L, Wu K (2016) Accurate combined keystrokes detection using acoustic signals. In: IEEE MSN Wang J, Ruby R, Wang L, Wu K (2016) Accurate combined keystrokes detection using acoustic signals. In: IEEE MSN
go back to reference Wang J, Zhao K, Zhang X, Peng C (2014) Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization. In: ACM MobiSys Wang J, Zhao K, Zhang X, Peng C (2014) Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization. In: ACM MobiSys
go back to reference Wang W, Liu AX, Sun K (2016) Device-free gesture tracking using acoustic signals. In: ACM MobiCom Wang W, Liu AX, Sun K (2016) Device-free gesture tracking using acoustic signals. In: ACM MobiCom
go back to reference Xu Y, Heinly J, White AM, Monrose F, Frahm JM (2013) Seeing double: reconstructing obscured typed input from repeated compromising reflections. In: ACM CCS Xu Y, Heinly J, White AM, Monrose F, Frahm JM (2013) Seeing double: reconstructing obscured typed input from repeated compromising reflections. In: ACM CCS
go back to reference Yin Y, Li Q, Xie L, Yi S, Novak E, Lu S (2016) Camk: a camera-based keyboard for small mobile devices. In: IEEE INFOCOM Yin Y, Li Q, Xie L, Yi S, Novak E, Lu S (2016) Camk: a camera-based keyboard for small mobile devices. In: IEEE INFOCOM
go back to reference Yue Q, Ling Z, Fu X, Liu B, Ren K, Zhao W (2014) Blind recognition of touched keys on mobile devices. In: ACM CCS Yue Q, Ling Z, Fu X, Liu B, Ren K, Zhao W (2014) Blind recognition of touched keys on mobile devices. In: ACM CCS
go back to reference Zhu T, Ma Q, Zhang S, Liu Y (2014) Context-free attacks using keyboard acoustic emanations. In: ACM CCS Zhu T, Ma Q, Zhang S, Liu Y (2014) Context-free attacks using keyboard acoustic emanations. In: ACM CCS
go back to reference Zhuang L, Zhou F, Tygar JD (2009) Keyboard acoustic emanations revisited. ACM Transactions on Information and System Security (TISSEC) Zhuang L, Zhou F, Tygar JD (2009) Keyboard acoustic emanations revisited. ACM Transactions on Information and System Security (TISSEC)
Metadata
Title
LOL: localization-free online keystroke tracking using acoustic signals
Authors
Zhenquan Qin
Jiaxin Du
Guangjie Han
Gaopeng Yong
Linlin Guo
Lei Wang
Publication date
23-11-2018
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 21/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3659-y

Other articles of this Issue 21/2019

Soft Computing 21/2019 Go to the issue

Premium Partner