Understanding and Securing Typing Privacy in Wireless Environments

dc.contributor.advisorFang, Song
dc.contributor.authorYang, Edwin
dc.contributor.committeeMemberCheng, Qi
dc.contributor.committeeMemberHougen, Dean
dc.contributor.committeeMemberKang, Ziho
dc.date.accessioned2024-07-29T15:47:10Z
dc.date.available2024-07-29T15:47:10Z
dc.date.issued2024-08-01
dc.date.manuscript2024-07-23
dc.description.abstractSensitive numbers play an unparalleled role in identification and authentication. Recent research has revealed plenty of side-channel attacks to infer keystrokes. The common idea is that pressing a key of a keyboard can cause a unique and subtle environmental change, which can be captured and analyzed by the eavesdropper to learn the keystrokes. However, these attacks also require either a training phase or a dictionary to build the relationship between an observed signal disturbance and a keystroke. As acquiring the training data about the victim is often unpractical, this research develops a side-channel attack that does not require training procedures. This dissertation demonstrates that typing a number creates not only a number of observed disturbances in space (each corresponding to a digit), but also a sequence of periods between each disturbance. Based upon existing work that utilizes inter-keystroke timing to infer keystrokes, we build a novel technique that combines the spatial and time domain information into a spatiotemporal feature of keystroke-disturbed wireless signals. With this spatiotemporal feature, the proposed attack can infer typed numbers without the aid of any training. Experimental results on top of software-defined radio platforms show that this attack vastly reduces the guesses required for breaking certain 6-digit PINs from 1 million to as low as 16, and can infer over 52% of user-chosen 6-digit PINs with less than 100 attempts. This dissertation also discusses feasible countermeasures that can resist the proposed attack and evaluates them in real-world typing environments.en_US
dc.identifier.urihttps://hdl.handle.net/11244/340524
dc.languageen_USen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectKeystroke eavesdroppingen_US
dc.subjectSSNen_US
dc.subjectPINen_US
dc.subjectSpatiotemporal correlationen_US
dc.thesis.degreePh.D.en_US
dc.titleUnderstanding and Securing Typing Privacy in Wireless Environmentsen_US
ou.groupGallogly College of Engineering::School of Computer Scienceen_US
shareok.orcid0000-0002-1794-5014en_US

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2024_Yang_Edwin_Dissertation.pdf
Size:
1.7 MB
Format:
Adobe Portable Document Format
Description:
No Thumbnail Available
Name:
2024_Yang_Edwin_Dissertation.zip
Size:
1.18 MB
Format:
Unknown data format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: