A survey on acoustic side channel attacks on keyboards

A Taheritajar, ZM Harris, R Rahaeimehr - International Conference on …, 2024 - Springer
Most electronic devices utilize keyboards to receive inputs, including sensitive information
such as authentication credentials, personal and private data, emails, plans, etc. However …

Don't skype & type! acoustic eavesdropping in voice-over-ip

A Compagno, M Conti, D Lain, G Tsudik - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Acoustic emanations of computer keyboards represent a serious privacy issue. As
demonstrated in prior work, physical properties of keystroke sounds might reveal what a …

RSPP: Restricted Static Pseudo-Partitioning for Mitigation of Cross-Core Covert Channel Attacks

J Kaur, S Das - ACM Transactions on Design Automation of Electronic …, 2024 - dl.acm.org
Cache timing channel attacks exploit the inherent properties of cache memories: hit and
miss time along with the shared nature of the cache to leak secret information. The side …

Skype & type: Keyboard eavesdropping in voice-over-ip

S Cecconello, A Compagno, M Conti, D Lain… - ACM Transactions on …, 2019 - dl.acm.org
Voice-over-IP (VoIP) software are among the most widely spread and pervasive software,
counting millions of monthly users. However, we argue that people ignore the drawbacks of …

Robust keystroke transcription from the acoustic side-channel

D Slater, S Novotney, J Moore, S Morgan… - Proceedings of the 35th …, 2019 - dl.acm.org
The acoustic emanations from keyboards provide a side-channel attack from which an
attacker can recover sensitive user information, such as passwords and personally …

SoK: Acoustic Side Channels

P Wang, S Nagaraja, A Bourquard, H Gao… - arXiv preprint arXiv …, 2023 - arxiv.org
We provide a state-of-the-art analysis of acoustic side channels, cover all the significant
academic research in the area, discuss their security implications and countermeasures …

We can hear your PIN drop: An acoustic side-channel attack on ATM PIN pads

K Balagani, M Cardaioli, S Cecconello, M Conti… - … on Research in …, 2022 - Springer
Abstract Personal Identification Numbers (PINs) are the most common user authentication
method for in-person banking transactions at ATMs. The US Federal Reserve reported that …

Highly secured arithmetic hiding based s-box on aes-128 implementation

AA Pammu, KS Chong, BH Gwee - … International Symposium on …, 2016 - ieeexplore.ieee.org
We propose an arithmetic hiding technique on Advanced Encryption Standard (AES)
algorithm implementation to highly secure the algorithm against Side-Channel Attack (SCA) …

Acoustic Side Channel Attack for Device Identification using Deep Learning Models

VS Adhin, A Maliekkal, K Mukilan… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Side-channel attacks are easy to execute and very hard to detect because of their passive
nature. If the side channels can be used to decode the device operation, the same can be …

[PDF][PDF] Human Interactions in Cybersecurity: Threats and Opportunities

M Cardaioli, M Conti, G Sartori - 2022 - research.unipd.it
Over the years, many cybersecurity breaches have been attributed to human error,
considering human factors as one of the weakest links in the security chain. In fact, human …