File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: TouchLogger: Inferring keystrokes on touch screen from smartphone motion
Title | TouchLogger: Inferring keystrokes on touch screen from smartphone motion |
---|---|
Authors | |
Issue Date | 2011 |
Citation | HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security, 2011 How to Cite? |
Abstract | Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are ineffective on smartphones without physical keyboards. We describe a new side channel, motion, on touch screen smartphones with only soft keyboards. Since typing on different locations on the screen causes different vibrations, motion data can be used to infer the keys being typed. To demonstrate this attack, we developed TouchLogger, an Android application that extracts features from device orientation data to infer keystrokes. TouchLogger correctly inferred more than 70% of the keys typed on a number-only soft keyboard on a smartphone. We hope to raise the awareness of motion as a significant side channel that may leak confidential data. |
Persistent Identifier | http://hdl.handle.net/10722/346590 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cai, Liang | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:54Z | - |
dc.date.available | 2024-09-17T04:11:54Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security, 2011 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346590 | - |
dc.description.abstract | Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are ineffective on smartphones without physical keyboards. We describe a new side channel, motion, on touch screen smartphones with only soft keyboards. Since typing on different locations on the screen causes different vibrations, motion data can be used to infer the keys being typed. To demonstrate this attack, we developed TouchLogger, an Android application that extracts features from device orientation data to infer keystrokes. TouchLogger correctly inferred more than 70% of the keys typed on a number-only soft keyboard on a smartphone. We hope to raise the awareness of motion as a significant side channel that may leak confidential data. | - |
dc.language | eng | - |
dc.relation.ispartof | HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security | - |
dc.title | TouchLogger: Inferring keystrokes on touch screen from smartphone motion | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-84970901426 | - |