A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm

被引:0
作者
Spata, Massimo Orazio [1 ]
Maria Russo, Valerio [1 ]
Ortis, Alessandro [1 ]
Battiato, Sebastiano [1 ]
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Keyboards; Acoustics; Portable computers; Pipelines; Deep learning; Side-channel attacks; Feature extraction; Accuracy; Overfitting; Computer architecture; Acoustic side channel attack; snooping keystroke attacks; deep learning; user security and privacy; laptop keystroke attacks; zoom-based acoustic attacks;
D O I
10.1109/ACCESS.2025.3536877
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, while key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results show a peak accuracy of 98.3%.
引用
收藏
页码:24498 / 24514
页数:17
相关论文
共 31 条
[1]   Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses [J].
Anand, S. Abhishek ;
Saxena, Nitesh .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :103-110
[2]  
[Anonymous], 1982, 5000:Tempest Fundamentals
[3]  
[Anonymous], 2010, P USENIX SEC S
[4]  
[Anonymous], 1987, Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
[5]  
Asonov D, 2004, P IEEE S SECUR PRIV, P3
[6]   I Know Your Keyboard Input: A Robust Keystroke Eavesdropper Based-on Acoustic Signals [J].
Bai, Jia-Xuan ;
Liu, Bin ;
Song, Luchuan .
PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, :1239-1247
[7]  
Berger Y., 2006, P 13 ACM C COMP COMM, P245
[8]  
Compagno A., PROC ACM ASIA C COMP, P703
[9]  
Dai Z, 2021, ADV NEUR IN, V34
[10]   THE WAVELET TRANSFORM, TIME-FREQUENCY LOCALIZATION AND SIGNAL ANALYSIS [J].
DAUBECHIES, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (05) :961-1005