Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3052973.3053005acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP

Published: 02 April 2017 Publication History

Abstract

Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adversary models that are not very practical in many real-world settings. Such strong models assume: (i) adversary's physical proximity to the victim, (ii) precise profiling of the victim's typing style and keyboard, and/or (iii) significant amount of victim's typed information (and its corresponding sounds) available to the adversary.
This paper presents and explores a new keyboard acoustic eavesdropping attack that involves Voice-over-IP (VoIP), called Skype & Type (S&T), while avoiding prior strong adversary assumptions. This work is motivated by the simple observation that people often engage in secondary activities (including typing) while participating in VoIP calls. As expected, VoIP software acquires and faithfully transmits all sounds, including emanations of pressed keystrokes, which can include passwords and other sensitive information. We show that one very popular VoIP software (Skype) conveys enough audio information to reconstruct the victim's input -- keystrokes typed on the remote keyboard. Our results demonstrate that, given some knowledge on the victim's typing style and keyboard model, the attacker attains top-5 accuracy of 91.7% in guessing a random key pressed by the victim.
Furthermore, we demonstrate that S&T is robust to various VoIP issues (e.g., Internet bandwidth fluctuations and presence of voice over keystrokes), thus confirming feasibility of this attack. Finally, it applies to other popular VoIP software, such as Google Hangouts.

References

[1]
2015: Skype's year in review. url: http://blogs.skype.com/2015/12/17/2015-skypes-year-in-review/ (visited on 06/29/2016).
[2]
Kamran Ali et al. "Keystroke recognition using WiFi signals". In: ACM MobiCom. 2015, pp. 90--102.
[3]
Dmitri Asonov and Rakesh Agrawal. "Keyboard acoustic emanations". In: IEEE S&P. 2004, pp. 3--11.
[4]
Davide Balzarotti, Marco Cova, and Giovanni Vigna. "Clearshot: Eavesdropping on keyboard input from video". In: IEEE S&P. 2008, pp. 170--183.
[5]
Yigael Berger, Avishai Wool, and Arie Yeredor. "Dictionary attacks using keyboard acoustic emanations". In: ACM CCS. 2006, pp. 245--254.
[6]
Stephen Boyd et al. "Accuracy at the top". In: NIPS. 2012, pp. 953--961.
[7]
Stuart Card, Thomas Moran, and Allen Newell. "The keystroke-level model for user performance time with interactive systems". In: CACM 7 (1980), pp. 396--410.
[8]
Anupam Das, Nikita Borisov, and Matthew Caesar. "Do you hear what I hear?: fingerprinting smart devices through embedded acoustic components". In: ACM CCS. 2014, pp. 441--452.
[9]
Jeffrey Friedman. "Tempest: A signal problem". In: NSA Cryptologic Spectrum (1972).
[10]
Isabelle Guyon et al. "Gene selection for cancer classification using support vector machines". In: Machine Learning 1-3 (2002), pp. 389--422.
[11]
Tzipora Halevi and Nitesh Saxena. "A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques". In: ACM CCS. 2012, pp. 89--90.
[12]
Tzipora Halevi and Nitesh Saxena. "Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios". In: International Journal of Information Security 5 (2015), pp. 443--456.
[13]
Tadayoshi Kohno, Andre Broido, and Kimberly Claffy. "Remote physical device fingerprinting". In: IEEE TDSC 2 (2005), pp. 93--108.
[14]
Paul Lamere et al. "The CMU SPHINX-4 speech recognition system". In: IEEE ICASSP. 2003, pp. 2--5.
[15]
Jian Liu et al. "Snooping keystrokes with mm-level audio ranging on a single phone". In: ACM MobiCom. 2015, pp. 142--154.
[16]
Beth Logan et al. "Mel Frequency Cepstral Coefficients for Music Modeling." In: ISMIR. 2000.
[17]
Jan Lukas, Jessica Fridrich, and Miroslav Goljan. "Digital camera identification from sensor pattern noise". In: IEEE TIFS 2 (2006), pp. 205--214.
[18]
Philip Marquardt et al. "(sp) iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers". In: ACM CCS. 2011, pp. 551--562.
[19]
Zdenek Martinasek, Vlastimil Clupek, and Krisztina Trasy. "Acoustic attack on keyboard using spectrogram and neural network". In: TSP. 2015, pp. 637--641.
[20]
Microsoft BUILD 2016 Keynote. url: https://channel9.msdn.com/Events/Build/2016/KEY01 (visited on 06/29/2016).
[21]
Opus Codec Support. url: https://wiki.xiph.org/OpusSupport (visited on 07/19/2016).
[22]
Over 1 billion Skype mobile downloads. url: http://blogs.skype.com/2016/04/28/over-1-billion-skype-mobile-downloads-thank-you/ (visited on 06/29/2016).
[23]
Oxford Dictionary - Which letters in the alphabet are used most often. url: http://www.oxforddictionaries.com/words/which-letters-are-used-most (visited on 06/29/2016).
[24]
EH Rothauser et al. "IEEE recommended practice for speech quality measurements". In: IEEE Transactions on Audio and Electroacoustics 3 (1969), pp. 225--246.
[25]
Diksha Shukla et al. "Beware, your hands reveal your secrets!" In: ACM CCS. 2014, pp. 904--917.
[26]
Jean-Marc Valin, Koen Vos, and T Terriberry. "Definition of the Opus audio codec". In: IETF, September (2012).
[27]
Martin Vuagnoux and Sylvain Pasini. "Compromising Electromagnetic Emanations of Wired and Wireless Keyboards." In: USENIX Security. 2009, pp. 1--16.
[28]
Junjue Wang et al. "Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization". In: ACM MobiSys. 2014, pp. 14--27.
[29]
RL Wegel and CE Lane. "The auditory masking of one pure tone by another and its probable relation to the dynamics of the inner ear". In: Physical Review 2 (1924), p. 266.
[30]
Teng Wei et al. "Acoustic eavesdropping through wireless vibrometry". In: ACM MobiCom. 2015, pp. 130--141.
[31]
Tong Zhu et al. "Context-free attacks using keyboard acoustic emanations". In: ACM CCS. 2014, pp. 453--464.
[32]
Li Zhuang, Feng Zhou, and Doug Tygar. "Keyboard acoustic emanations revisited". In: ACM TISSEC 1 (2009), p. 3.

Cited By

View all
  • (2024)Acoustic Side Channel Attack for Keystroke Splitting in the Wild2024 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE)10.1109/MetroXRAINE62247.2024.10796234(131-136)Online publication date: 21-Oct-2024
  • (2024)A survey of acoustic eavesdropping attacks: Principle, methods, and progressHigh-Confidence Computing10.1016/j.hcc.2024.1002414:4(100241)Online publication date: Dec-2024
  • (2024)A Survey on Acoustic Side Channel Attacks on KeyboardsInformation and Communications Security10.1007/978-981-97-8798-2_6(99-121)Online publication date: 25-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
April 2017
952 pages
ISBN:9781450349444
DOI:10.1145/3052973
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. keyboard acoustic eavesdropping
  2. machine learning
  3. privacy
  4. security
  5. side-channel attack
  6. skype

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '17
Sponsor:

Acceptance Rates

ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)7
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Acoustic Side Channel Attack for Keystroke Splitting in the Wild2024 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE)10.1109/MetroXRAINE62247.2024.10796234(131-136)Online publication date: 21-Oct-2024
  • (2024)A survey of acoustic eavesdropping attacks: Principle, methods, and progressHigh-Confidence Computing10.1016/j.hcc.2024.1002414:4(100241)Online publication date: Dec-2024
  • (2024)A Survey on Acoustic Side Channel Attacks on KeyboardsInformation and Communications Security10.1007/978-981-97-8798-2_6(99-121)Online publication date: 25-Dec-2024
  • (2024)Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet TransformMachine Learning for Cyber Security10.1007/978-981-97-2458-1_1(1-16)Online publication date: 23-Apr-2024
  • (2024)A New Deep Learning Pipeline for Acoustic Attack on KeyboardsIntelligent Systems and Applications10.1007/978-3-031-66329-1_26(402-414)Online publication date: 31-Jul-2024
  • (2023)Auditory eyesightProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620248(175-192)Online publication date: 9-Aug-2023
  • (2023)Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179423(3432-3449)Online publication date: May-2023
  • (2023)Experimental Analysis of Side-Channel Emissions for IoT Devices Activities’ Profiling2023 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT)10.1109/MetroInd4.0IoT57462.2023.10180188(42-47)Online publication date: 6-Jun-2023
  • (2023)A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00034(270-280)Online publication date: Jul-2023
  • (2022)Cyber-Security Threats and Side-Channel Attacks for Digital AgricultureSensors10.3390/s2209352022:9(3520)Online publication date: 5-May-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media