2022
DOI: 10.1109/tnet.2022.3147721
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Training-Free Keystroke Inference Attack and Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…After connecting to the AP for accessing the Internet, Bob happens to have the need to access a sensitive account (e.g., online payment) protected by a password, which makes him a target of attack launched by Eve (see Figure 1). We follow the convention [34,67] to mainly focus on numerical passwords, but we also consider an extension to general KI in Section 5.4.2. From here on, our method diverges from existing ones that either demand a rogue AP to trick Bob into using its service [19,34], or require setting up extra Wi-Fi communication links to "sense" Bob's typing [2,67].…”
Section: Attack Scenarios and Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…After connecting to the AP for accessing the Internet, Bob happens to have the need to access a sensitive account (e.g., online payment) protected by a password, which makes him a target of attack launched by Eve (see Figure 1). We follow the convention [34,67] to mainly focus on numerical passwords, but we also consider an extension to general KI in Section 5.4.2. From here on, our method diverges from existing ones that either demand a rogue AP to trick Bob into using its service [19,34], or require setting up extra Wi-Fi communication links to "sense" Bob's typing [2,67].…”
Section: Attack Scenarios and Methodsmentioning
confidence: 99%
“…We follow the convention [34,67] to mainly focus on numerical passwords, but we also consider an extension to general KI in Section 5.4.2. From here on, our method diverges from existing ones that either demand a rogue AP to trick Bob into using its service [19,34], or require setting up extra Wi-Fi communication links to "sense" Bob's typing [2,67]. Essentially, WiKI-Eve's attack method allows Eve to launch an attack on Bob regardless of which AP Bob is connected to.…”
Section: Attack Scenarios and Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ref. [ 13 ] demonstrated that inference attack on physical keyboards using acoustic signals is possible on smartwatch, and [ 14 ] presents a keylogging inference attack typed with in-air tapping keyboard. These two studies do not install malicious codes to steal keyboard data without infecting target computers.…”
Section: Introductionmentioning
confidence: 99%