SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals. Meteriz-Yıldıran, Ü., Yildiran, N. F., & Mohaisen, D. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, of WPES '21, pages 209–221, New York, NY, USA, 2021. Association for Computing Machinery.
SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals [link]Paper  doi  abstract   bibtex   
The convergence of various technologies, such as smartwatches, smartphones, etc. has proven to be beneficial, although poses various security and privacy risks. In this paper, we explore one such risk where a smartwatch can be exploited to infer what a user is typing on a physical keyboard while wearing the smartwatch. We exploited the acoustic emanations of the keyboard as recorded by the smartwatch to perform the proposed attack-SIA. To address various environment-related challenges, SIA employs four stages: Noise Cancelling, Keystroke Detection, Key Identification, and Word Correction, where several digital signal processing, machine learning, and natural language processing techniques are utilized to produce the final inference. Our results show that an acoustic emanation of a physical keyboard captured by a smartwatch recovers up to 98% of the typed text. We also showed that utilizing the noise cancellation, SIA is robust to the changes in the attack environment, which further boosts the practicality of the attack. The findings are alarming and call for further investigation on methods to cope with inference attacks due to the convergence of those technologies.
@inproceedings{10.1145/3463676.3485607,
author = {Meteriz-Y\i{}ld\i{}ran, \"{U}lk\"{u} and Yildiran, Necip Fazil and Mohaisen, David},
title = {SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals},
year = {2021},
isbn = {9781450385275},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3463676.3485607},
doi = {10.1145/3463676.3485607},
abstract = {The convergence of various technologies, such as smartwatches, smartphones, etc. has proven to be beneficial, although poses various security and privacy risks. In this paper, we explore one such risk where a smartwatch can be exploited to infer what a user is typing on a physical keyboard while wearing the smartwatch. We exploited the acoustic emanations of the keyboard as recorded by the smartwatch to perform the proposed attack-SIA. To address various environment-related challenges, SIA employs four stages: Noise Cancelling, Keystroke Detection, Key Identification, and Word Correction, where several digital signal processing, machine learning, and natural language processing techniques are utilized to produce the final inference. Our results show that an acoustic emanation of a physical keyboard captured by a smartwatch recovers up to 98% of the typed text. We also showed that utilizing the noise cancellation, SIA is robust to the changes in the attack environment, which further boosts the practicality of the attack. The findings are alarming and call for further investigation on methods to cope with inference attacks due to the convergence of those technologies.},
booktitle = {Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society},
pages = {209–221},
numpages = {13},
keywords = {keylogging, machine learning, natural language processing, noise reduction, signal processing, smartwatch, wearable privacy},
location = {Virtual Event, Republic of Korea},
series = {WPES '21}
}

Downloads: 0