The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual "computer hackers" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.
[1]
Derya Birant,et al.
A Weighted Majority Voting Ensemble Approach for Classification
,
2019,
2019 4th International Conference on Computer Science and Engineering (UBMK).
[2]
Sen Wang,et al.
Snoopy
,
2018,
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[3]
Tie-Yan Liu,et al.
LightGBM: A Highly Efficient Gradient Boosting Decision Tree
,
2017,
NIPS.
[4]
Yan Wang,et al.
Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN
,
2016,
AsiaCCS.
[5]
Tianqi Chen,et al.
XGBoost: A Scalable Tree Boosting System
,
2016,
KDD.
[6]
He Wang,et al.
MoLe: Motion Leaks through Smartwatch Sensors
,
2015,
MobiCom.
[7]
Adam J. Aviv,et al.
Practicality of accelerometer side channels on smartphones
,
2012,
ACSAC '12.
[8]
Pierre Geurts,et al.
Extremely randomized trees
,
2006,
Machine Learning.
[9]
Yaxin Bi,et al.
KNN Model-Based Approach in Classification
,
2003,
OTM.
[10]
L. Breiman.
Random Forests
,
2001,
Encyclopedia of Machine Learning and Data Mining.
[11]
Marti A. Hearst.
Trends & Controversies: Support Vector Machines
,
1998,
IEEE Intell. Syst..
[12]
John C. Cerrito,et al.
Preprocessing the Data
,
2010
.