Presentation is loading. Please wait.

Presentation is loading. Please wait.

0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S

Similar presentations


Presentation on theme: "0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S"— Presentation transcript:

1 0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S http://www.cs.utexas.edu/~shmat/courses/cs380s/

2 L. Zhuang, F. Zhou, D. Tygar Keyboard Acoustic Emanations Revisited (CCS 2005)

3 Acoustic Information in Typing uDifferent keystrokes make different sounds Different locations on the supporting plate Each key is slightly different uFrequency information in the sound of the typed key can be used to learn which key it is Observed by Asonov and Agrawal (2004) slide 3

4 “Key” Observation uBuild acoustic model for keyboard and typist uExploit the fact that typed text is non-random (for example, English) Limited number of words Limited letter sequences (spelling) Limited word sequences (grammar) uThis requires a language model Statistical learning theory Natural language processing slide 4

5 Sound of a Keystroke uEach keystroke is represented as a vector of Cepstrum features Fourier transform of the decibel spectrum Standard technique from speech processing slide 5 [Zhuang, Zhou, Tygar]

6 Bi-Grams of Characters uGroup keystrokes into N clusters uFind the best mapping from cluster labels to characters uUnsupervised learning: exploit the fact that some 2-character combinations are more common Example: “th” vs. “tj” Hidden Markov Models (HMMs) slide 6 5112 “t”“h”“e” [Zhuang, Zhou, Tygar]

7 Add Spelling and Grammar uSpelling correction uSimple statistical model of English grammar Tri-grams of words uUse HMMs again to model slide 7 [Zhuang, Zhou, Tygar]

8 Recovered Text _____ = errors in recovery = errors corrected by grammar slide 8 Before spelling and grammar correction After spelling and grammar correction [Zhuang, Zhou, Tygar]

9 Feedback-based Training uRecovered characters + language correction provide feedback for more rounds of training uOutput: keystroke classifier Language-independent Can be used to recognize random sequence of keys –For example, passwords Representation of keystroke classifier –Neural networks, linear classification, Gaussian mixtures slide 9 [Zhuang, Zhou, Tygar]

10 Overview Initial training Unsupervised Learning Language Model Correction Sample Collector Classifier Builder keystroke classifier recovered keystrokes Feature Extraction wave signal (recorded sound) Subsequent recognition Feature Extraction wave signal Keystroke Classifier Language Model Correction (optional) recovered keystrokes [Zhuang, Zhou, Tygar] slide 10

11 Experiment: Single Keyboard uLogitech Elite Duo wireless keyboard u4 data sets recorded in two settings: quiet and noisy Consecutive keystrokes are clearly separable uAutomatically extract keystroke positions in the signal with some manual error correction [Zhuang, Zhou, Tygar] slide 11

12 Results for a Single Keyboard slide 12 Recording lengthNumber of wordsNumber of keys Set 1~12 min~400~2500 Set 2~27 min~1000~5500 Set 3~22 min~800~4200 Set 4~24 min~700~4300 Set 1 (%)Set 2 (%)Set 3 (%)Set 4 (%) WordCharWordCharWordCharWordChar Initial3576398032732368 Final9096899683958092 [Zhuang, Zhou, Tygar] uDatasets uInitial and final recognition rate

13 Experiment: Multiple Keyboards uKeyboard 1: Dell QuietKey PS/2 In use for about 6 months uKeyboard 2: Dell QuietKey PS/2 In use for more than 5 years uKeyboard 3: Dell Wireless Keyboard New slide 13 [Zhuang, Zhou, Tygar]

14 Results for Multiple Keyboards u12-minute recording with app. 2300 characters Keyboard 1 (%)Keyboard 2 (%)Keyboard 3 (%) WordCharWordCharWordChar Initial317220622364 Final829382947590 [Zhuang, Zhou, Tygar] slide 14

15 Defenses uPhysical security uTwo-factor authentication uMasking noise uKeyboards with uniform sound (?) slide 15


Download ppt "0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S"

Similar presentations


Ads by Google