Enter your keyword

2-s2.0-85050522691

[vc_empty_space][vc_empty_space]

The microphone array sensor attack on keyboard acoustic emanations: Side-channel attack

Maimuna, Rosmansyah Y.a

a School of Electrical Engineering and Informatics, Bandung Institute of Technology, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2017 IEEE.Common people have no awareness of silent attack which exploits information leakage from acoustic of electronic devices. In computer mechanism, physical information is entered through the input device such as a keypad or a keyboard. Computer user types password or pin code by pressing the key button which emits an acoustic sound. The sound is analyzed by an attacker with computational methods to recognize the keys. Various attack of keyboard acoustic emanations was developed to find vulnerabilities as a risk assessment of keyboard. Authors developed the microphone array sensor attack to gain high accuracy in key recognition with a simple method. Sensors are two microphones which are placed sequential and linear in front of the target to acquire time difference. Arrival time is analyzed to define a starting time value for TDoA estimation and to calculate the direction of the sound source. The attackers can discover the location of the key by the geometric approach and without training data for key classification. The results are 86 percent accuracy of 300 keystrokes and 100 percent of 13 keys recognized. It indicates the significant risk of attack and should realize as a serious threat of keyboard vulnerabilities.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Acoustic measurements,Electronic device,Geometric approaches,Information leakage,Microphone arrays,Physical information,Time of arrival estimation,Time-differences[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]acoustic emission,acoustic measurement,computer security,data acquisition,information security,Side-channel attack,time of arrival estimation[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2017.8267954[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]