Acoustic Attack Records Laptop Keystrokes With Nearby Phone

Acoustic Attack Records Laptop Keystrokes With Nearby Phone

The constant deep-learning advancements, widespread microphones, and online services are actively escalating the threat of acoustic side-channel attacks on keyboards.

An innovative deep learning model uses a nearby phone’s microphone to classify laptop keystrokes with 95% accuracy and 93% accuracy when trained on Zoom recordings, setting new benchmarks for acoustic attack implementation.

While all these findings are recently unveiled by cybersecurity researchers from the following British universities:-

  • Joshua Harrison from Durham University
  • Ehsan Toreini from the University of Surrey
  • Maryam Mehrnezhad Royal Holloway University of London

Data Targeted by the Attack

The targeted acoustic attack compromises data security, potentially leaking the following data to malicious third parties:-

Unlike other side-channel attacks with limitations, acoustic attacks are now simpler with widespread microphone-bearing devices. 

These devices enable high-quality audio captures without special conditions or data rate restrictions.

While rapid machine learning advancements enable feasible and highly dangerous sound-based side-channel attacks, surpassing previous expectations.

Design of the Attack

To initiate the attack, keystrokes are recorded on the target’s keyboard for training the prediction algorithm. This can be done using a nearby microphone or an infected phone with microphone access.

The Zoom-based recording of keystrokes links typed messages to sound recordings by rogue participants. Researchers trained data by pressing 36 keys on a modern MacBook Pro 25 times and capturing the produced sounds.

Acoustic Attack Records Laptop Keystrokes With Nearby Phone
Keystroke isolation process (Source – Arxiv)

‘CoAtNet’ trained with spectrogram images, an image classifier that required experimentation with the following elements to achieve optimal prediction accuracy:-

  • Epoch
  • Learning rate
  • Data splitting parameters
Acoustic Attack Records Laptop Keystrokes With Nearby Phone
Waveform and corresponding mel-spectrogram (Source – Arxiv)

While in this experiment following things are used by the security analysts:-

  • Standard Apple laptop keyboard
  • iPhone 13 mini (Positioned 17cm from target) 
  • Zoom

Accuracy Achievements

Here below, we have mentioned the accuracy achievements of CoANet:-

  • From smartphone recordings: 95% accuracy
  • Zoom: 93% accuracy
  • Skype captures 91.7% accuracy.

Recommendations

Here below, we have mentioned all the recommendations offered by the cybersecurity researchers:-

  • Alter typing styles or employ randomized passwords to counter acoustic side-channel attacks.
  • Additional defense measures involve software-based replication of keystroke sounds, white noise, or audio filters for keystrokes.
  • Make sure to use biometric authentication where possible.
  • Ensure the use of robust password managers.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.




Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.