skip to main content
10.1145/3463676.3485607acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals

Published:15 November 2021Publication History

ABSTRACT

The convergence of various technologies, such as smartwatches, smartphones, etc. has proven to be beneficial, although poses various security and privacy risks. In this paper, we explore one such risk where a smartwatch can be exploited to infer what a user is typing on a physical keyboard while wearing the smartwatch. We exploited the acoustic emanations of the keyboard as recorded by the smartwatch to perform the proposed attack-SIA. To address various environment-related challenges, SIA employs four stages: Noise Cancelling, Keystroke Detection, Key Identification, and Word Correction, where several digital signal processing, machine learning, and natural language processing techniques are utilized to produce the final inference. Our results show that an acoustic emanation of a physical keyboard captured by a smartwatch recovers up to 98% of the typed text. We also showed that utilizing the noise cancellation, SIA is robust to the changes in the attack environment, which further boosts the practicality of the attack. The findings are alarming and call for further investigation on methods to cope with inference attacks due to the convergence of those technologies.

Skip Supplemental Material Section

Supplemental Material

WPES14.mp4

mp4

171.7 MB

References

  1. 2020. Smartwatch Market - Growth, Trends, Forecasts (2020 - 2025). https://www.researchandmarkets.com/reports/4591978/smartwatch-market- growth-trends-forecastGoogle ScholarGoogle Scholar
  2. Manal Al-Sharrah, Ayed Salman, and Imtiaz Ahmad. 2018. Watch Your Smartwatch. In 2018 International Conference on Computing Sciences and Engineering (ICCSE). 1--5. https://doi.org/10.1109/ICCSE1.2018.8374228Google ScholarGoogle Scholar
  3. Kamran Ali, Alex X. Liu, Wei Wang, and Muhammad Shahzad. 2015. Keystroke Recognition Using WiFi Signals. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (Paris, France) (MobiCom '15). Association for Computing Machinery, New York, NY, USA, 90--102. https://doi.org/10.1145/2789168.2790109Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Asonov and R. Agrawal. 2004. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004. 3--11. https://doi.org/10.1109/SECPRI.2004.1301311Google ScholarGoogle ScholarCross RefCross Ref
  5. Ibrahim Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, and Glenn McGee. 2015. Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In 2015 10th International Conference on Availability, Reliability and Security. 303--311. https://doi.org/10.1109/ARES.2015.39Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Balzarotti, M. Cova, and G. Vigna. 2008. ClearShot: Eavesdropping on Keyboard Input from Video. In 2008 IEEE Symposium on Security and Privacy (sp 2008). 170--183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bianco D. Barisani A. 2009. Sniffing Keystrokes With Lasers and Voltmeters. In In Proceedings of Black Hat USA.Google ScholarGoogle Scholar
  8. Vincent Becker, Linus Fessler, and Gábor Sörös. 2019. GestEar: Combining Audio and Motion Sensing for Gesture Recognition on Smartwatches. In Proceedings of the 23rd International Symposium on Wearable Computers (London, United Kingdom) (ISWC '19). Association for Computing Machinery, New York, NY, USA, 10--19. https://doi.org/10.1145/3341163.3347735Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yigael Berger, Avishai Wool, and Arie Yeredor. 2006. Dictionary Attacks Using Keyboard Acoustic Emanations. In Proceedings of the 13th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA) (CCS '06). Association for Computing Machinery, New York, NY, USA, 245--254. https://doi.org/10.1145/1180405.1180436Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bo Chen, Vivek Yenamandra, and Kannan Srinivasan. 2015. Tracking Keystrokes Using Wireless Signals. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (Florence, Italy) (MobiSys '15). Association for Computing Machinery, New York, NY, USA, 31--44. https://doi.org/10.1145/2742647.2742673Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Alberto Compagno, Mauro Conti, Daniele Lain, and Gene Tsudik. 2017. Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP. In Proceedings ACM on Asia Conference on Computer and Communications Security (Abu Dhabi, United Arab Emirates). ACM, New York, NY, USA, 703--715. https://doi.org/10.1145/3052973.3053005Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Stanford Center for Digital Health and Rock Health. 2019. https://rockhealth.com/reports/digital-health-consumer-adoption-report-2019/Google ScholarGoogle Scholar
  13. Jeffrey Friedman. 1972. Tempest: A signal problem. NSA Cryptologic Spectrum, Vol. 35 (1972), 76.Google ScholarGoogle Scholar
  14. Jun Gong, Zheer Xu, Qifan Guo, Teddy Seyed, Xiang 'Anthony' Chen, Xiaojun Bi, and Xing-Dong Yang. 2018. WrisText: One-Handed Text Entry on Smartwatch Using Wrist Gestures .Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, 1--14. https://doi.org/10.1145/3173574.3173755Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Hagiwara. 2021. Real-World Natural Language Processing: Practical applications with deep learning. Manning Publications. https://books.google.com.tr/books?id=A92_zQEACAAJGoogle ScholarGoogle Scholar
  16. Tzipora Halevi and Nitesh Saxena. 2014. Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. International Journal of Information Security, Vol. 14 (09 2014), 1--14. https://doi.org/10.1007/s10207-014-0264-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. CoRR, Vol. abs/1412.6980 (2014). arxiv: 1412.6980 http://arxiv.org/abs/1412.6980Google ScholarGoogle Scholar
  18. Bryan Klimt and Yiming Yang. 2004. The Enron Corpus: A New Dataset for Email Classification Research. In Proceedings of the 15th European Conference on Machine Learning (Pisa, Italy) (ECML'04). Springer-Verlag, Berlin, Heidelberg, 217--226. https://doi.org/10.1007/978-3-540-30115-8_22Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gierad Laput and Chris Harrison. 2019. Sensing Fine-Grained Hand Activity with Smartwatches. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). Association for Computing Machinery, New York, NY, USA, 1--13. https://doi.org/10.1145/3290605.3300568Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ho-Man Colman Leung, Chi-Wing Fu, and Pheng-Ann Heng. 2018. TwistIn: Tangible Authentication of Smart Devices via Motion Co-Analysis with a Smartwatch. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 2, 2, Article 72 (July 2018), 24 pages. https://doi.org/10.1145/3214275Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Vladimir I Levenshtein. 1966. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady, Vol. 10 (February 1966), 707.Google ScholarGoogle Scholar
  22. S. Li, A. Ashok , Y. Zhang, C. Xu, J. Lindqvist, and M. Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--9. https://doi.org/10.1109/PERCOM.2016.7456514Google ScholarGoogle ScholarCross RefCross Ref
  23. Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. 2015. When Good Becomes Evil: Keystroke Inference with Smartwatch. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS '15). Association for Computing Machinery, New York, NY, USA, 1273--1285. https://doi.org/10.1145/2810103.2813668Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Chris Xiaoxuan Lu, Bowen Du, Peijun Zhao, Hongkai Wen, Yiran Shen, Andrew Markham, and Niki Trigoni. 2018. Deepauth: In-Situ Authentication for Smartwatches via Deeply Learned Behavioural Biometrics. In Proceedings of the 2018 ACM International Symposium on Wearable Computers (Singapore, Singapore) (ISWC '18). Proceedings of the 2018 ACM International Symposium on Wearable Computers, New York, NY, USA, 204--207. https://doi.org/10.1145/3267242.3267252Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, and Jibo He. 2016. Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (China) (ASIA CCS '16). Association for Computing Machinery, New York, NY, USA, 795--806. https://doi.org/10.1145/2897845.2897905Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (Sp)IPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In 18th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA) (CCS '11). ACM, New York, NY, USA, 551--562. https://doi.org/10.1145/2046707.2046771Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ülkü Meteriz, Necip Fazil Yldran, Joongheon Kim, and David Mohaisen. 2020. Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). 464--473. https://doi.org/10.1109/ICDCS47774.2020.00063Google ScholarGoogle Scholar
  28. J. V. Monaco. 2018. SoK: Keylogging Side Channels. In 2018 IEEE Symposium on Security and Privacy (SP). 211--228.Google ScholarGoogle Scholar
  29. Peter Norvig. 2007. https://norvig.com/spell-correct.htmlGoogle ScholarGoogle Scholar
  30. Nicole Odom, Jesse Lindmar, John Hirt, and Josh Brunty. 2019. Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices. Journal of Forensic Sciences, Vol. 64 (06 2019). https://doi.org/10.1111/1556--4029.14109Google ScholarGoogle ScholarCross RefCross Ref
  31. Alec Radford, Jeff Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019).Google ScholarGoogle Scholar
  32. Mohd Sabra, Anindya Maiti, and Murtuza Jadliwala. 2020. Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. arxiv: 2010.12078 [cs.CR]Google ScholarGoogle Scholar
  33. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research, Vol. 15, 56 (2014), 1929--1958. http://jmlr.org/papers/v15/srivastava14a.htmlGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  34. T. Sztyler and H. Stuckenschmidt. 2017. Online personalization of cross-subjects based activity recognition models on wearable devices. In 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom). 180--189. https://doi.org/10.1109/PERCOM.2017.7917864Google ScholarGoogle ScholarCross RefCross Ref
  35. Aku Visuri, Zhanna Sarsenbayeva, Niels van Berkel, Jorge Goncalves, Reza Rawassizadeh, Vassilis Kostakos, and Denzil Ferreira. 2017. Quantifying Sources and Types of Smartwatch Usage Sessions. Association for Computing Machinery, New York, NY, USA, 3569--3581. https://doi.org/10.1145/3025453.3025817Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Tran Huy Vu, Archan Misra, Quentin Roy, Kenny Choo Tsu Wei, and Youngki Lee. 2018. Smartwatch-Based Early Gesture Detection 8 Trajectory Tracking for Interactive Gesture-Driven Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 2, 1, Article 39 (March 2018), 27 pages. https://doi.org/10.1145/3191771Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Martin Vuagnoux and Sylvain Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. USENIX Security Symposium (01 2009).Google ScholarGoogle Scholar
  38. Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, and Bo Liu. 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. 189--200. https://doi.org/10.1145/2897845.2897847Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. He Wang, Ted Tsung-Te Lai, and Romit Roy Choudhury. 2015. MoLe: Motion Leaks through Smartwatch Sensors. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (Paris, France) (MobiCom '15). Association for Computing Machinery, New York, NY, USA, 155--166. https://doi.org/10.1145/2789168.2790121Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. X. Yu, Z. Zhou, M. Xu, X. You, and X. Li. 2020. ThumbUp: Identification and Authentication by Smartwatch using Simple Hand Gestures. In 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--10. https://doi.org/10.1109/PerCom45495.2020.9127367Google ScholarGoogle ScholarCross RefCross Ref
  41. Li Zhuang, Feng Zhou, and J. D. Tygar. 2009. Keyboard Acoustic Emanations Revisited. ACM Trans. Inf. Syst. Secur., Vol. 13, 1, Article 3 (Nov. 2009), 26 pages. https://doi.org/10.1145/1609956.1609959Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society
            November 2021
            257 pages
            ISBN:9781450385275
            DOI:10.1145/3463676
            • General Chairs:
            • Yongdae Kim,
            • Jong Kim,
            • Program Chairs:
            • Giovanni Livraga,
            • Noseong Park

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 November 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate106of355submissions,30%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader