The researchers also used real-world attack scenarios, such as snooping on a laptop keyboard using the microphone on a smartphone in the same room, and by capturing the sound on a Zoom call.Īs it is in so much cybersecurity research, Artificial Intelligence is centre stage. For example, when typing a password, people will regularly hide their screen but will do little to obfuscate their keyboard’s sound. The ubiquity of keyboard acoustic emanations makes them not only a readily available attack vector, but also prompts victims to underestimate (and therefore not try to hide) their output. However, this research is firmly rooted in the possible, starting with the decision to monitor sound, rather than something more exotic. Side channel research can get a little far-fetched and impractical at times but it serves a useful purpose in improving our knowledge about what’s possible. Computers typically have lots of side channels, such as noises, heat, and changes in electromagnetic emissions, which can be hoovered up and analysed by adversaries to learn more about what’s happening on the computer. The slight differences in the sounds each key makes is an unintentional leak of information, known as a “side channel”. The technique, developed at Durham University, the University of Surrey, and Royal Holloway University of London, builds on previous work to produce a more accurate way to guess your password by listening to the sound of you typing it on your keyboard. As if password authentication’s coffin needed any more nails, researchers in the UK have discovered yet another way to hammer one in.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |