Behavicker: Eavesdropping Computer-Usage Activities through Acoustic Side Channel
نویسندگان
چکیده
Computers are widely used for business and entertainment purposes throughout our modern lives. Computer kits provide a variety of services such as text processing, programming, shopping, gaming. have greatly enhanced the quality lives; however, we discover an often-overlooked fact that engaging in computer-related activities may be eavesdropped upon by attacker sniffing emitted acoustic signals from keyboard mouse. The activity eavesdropping via side channel has lower requirements terms hardware instrumentation is easier to implement real-world applications than other attacks been presented previous work. In this paper, design system, namely, Behavicker, validate feasibility kind attack. Unlike conventional recognition, Behavicker infers high-level computer-usage with semantics-preserving multiscale learning scheme, based on recognition basic mouse events including left click, right middle scrolling up, down. Real-world experiments show can recognize six interaction accuracy 88.3% infer 82.7% indoor environment.
منابع مشابه
On Side-Channel Resistant Block Cipher Usage
Based on re-keying techniques by Abdalla, Bellare, and Borst, we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversary that can adaptively choose the leakage function as long as the leaked information is bounded. It turns out that...
متن کاملAcoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record of the sound it makes, if the microphone is close enough to the printer. In our experiments, the attack recovers up to 72 % of printed words, and up to 95 % if we assume contextual knowledge about the text, with a micro...
متن کاملTowards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversary that can adaptively choose the leakage function as long as the leaked information is bounded. It turns o...
متن کاملEavesdropping attacks on computer displays
Electromagnetic information leakage from computer displays was first demonstrated to the general public by van Eck in 1985. Nearby eavesdroppers can pick up compromising emanations from computer hardware with directional antennas and wideband receivers. The basic phenomenon is easily demonstrated with modified TV sets. However, to separate practically readable text shown on modern high-resoluti...
متن کاملTrojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojans which intentionally induce ph...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2022
ISSN: ['1530-8669', '1530-8677']
DOI: https://doi.org/10.1155/2022/8090652