Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa
{"title":"武器化物联网传感器:当表选择带来安全漏洞时","authors":"Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa","doi":"10.1109/TPS-ISA56441.2022.00029","DOIUrl":null,"url":null,"abstract":"The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual \"computer hackers\" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.","PeriodicalId":427887,"journal":{"name":"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability\",\"authors\":\"Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa\",\"doi\":\"10.1109/TPS-ISA56441.2022.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual \\\"computer hackers\\\" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.\",\"PeriodicalId\":427887,\"journal\":{\"name\":\"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPS-ISA56441.2022.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPS-ISA56441.2022.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability
The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual "computer hackers" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.