武器化物联网传感器:当表选择带来安全漏洞时

Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa
{"title":"武器化物联网传感器:当表选择带来安全漏洞时","authors":"Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa","doi":"10.1109/TPS-ISA56441.2022.00029","DOIUrl":null,"url":null,"abstract":"The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual \"computer hackers\" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.","PeriodicalId":427887,"journal":{"name":"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability\",\"authors\":\"Gustavo Casqueiro, Sayed Erfan Arefin, T. Ashrafi, Abdul Serwadda, Hassan Wasswa\",\"doi\":\"10.1109/TPS-ISA56441.2022.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual \\\"computer hackers\\\" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.\",\"PeriodicalId\":427887,\"journal\":{\"name\":\"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPS-ISA56441.2022.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPS-ISA56441.2022.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

键盘记录程序对笔记本电脑和台式电脑构成的安全威胁,传统上是从恶意软件的角度来理解的,恶意软件直接读取受害者机器上的按键。虽然最近对智能手机平台的研究表明,这些手机内置的运动/振动传感器也会造成键盘记录威胁,但由于台式机和笔记本电脑设置中不存在此类传感器,因此从未对这些攻击进行过调查。在本文中,我们证明了常用的电脑桌材料的振动动力学在打字过程中以如此细的粒度传递键盘振动,以至于键盘输入位置(以及因此的击键)可以从振动中学习。在实际操作中,这种攻击可以通过在电脑桌面或键盘底部系统地安装一系列运动传感器,然后挖掘这些传感器在打字过程中产生的数据来实现。以典型的电脑桌材料为例,如玻璃、塑料、金属和木材,我们研究了这条攻击线,并强调了它构成潜在威胁的场景。由于快速发展的物联网平台提供了易于使用,功能齐全,廉价的传感器,我们认为即使是不了解低级硬件编程的休闲“计算机黑客”也可以访问这条攻击线。这篇论文揭示了一个以前未被探索过的隐私威胁,随着物联网成为主流,安全从业者和最终用户需要关注这个威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability
The security threat posed by keyloggers on laptop and desktop computers is traditionally understood from the perspective of malware that directly reads keystrokes on the victim’s machine. While recent research on smart phone platforms has shown that motion/vibration sensors inbuilt in these phones also pose a keylogging threat, this line of attack has never been investigated in desktop and laptop settings given that no such sensors exist in these settings. In this paper, we show that the vibration dynamics of commonly used computer table materials transmit keyboard vibrations during typing with such fine granularity that keyboard typing locations (and hence keystrokes) could be learned from the vibrations. In practice such an attack would be executed by methodically rigging the underside of a computer table or keyboard itself with a series of motion sensors, and then mining the data generated by these sensors during typing. Taking the case of typical computer table materials such as glass, plastic, metal and wood, we study this line of attack and highlight scenarios where it poses a potent threat. Thanks to fast growing IoT platforms making available easy-to-use, fully featured, cheap sensors, we argue that this line of attack is accessible to even casual "computer hackers" having no knowledge of low-level hardware programming. The paper brings to light a previously unexplored privacy threat that security practitioners and end-users need to pay attention to as IoT goes mainstream.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信