Feeds

Typing: music to fraudsters' ears

From keyboarding to frauding

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Computer users should learn to type silently if they don't want to reveal intimate details such as passwords, according to a new study Researchers at the University of California, Berkeley have discovered that a simple audio recording of keyboard clicks can betray what users have typed, possibly leading users to betray intimate details about their lives to virus writers and fraudsters.

In an experiment carried out at the university, computer scientists were able to take several 10-minute sound recordings of users typing, feed the audio into a computer and use an algorithm to recover up to 96 percent of the characters entered on a keyboard.

"It's a form of acoustical spying that should raise red flags among computer security and privacy experts," said Doug Tygar, UC Berkeley professor of computer science and information management and principal investigator of the study. "If we were able to figure this out, it's likely that people with less honourable intentions can - or have - as well."

According to the researchers, what makes the technique feasible is that each keystroke makes a relatively distinct sound, however subtle, when hit. Given that typical users type around 300 characters per minute, enough time is left for a computer to isolate individual keystrokes and categorise the letters based upon the statistical characteristics of English text. For example, the letters "th" will occur together more frequently than "tj," and the word "yet" is far more common than "yrg."

"Using statistical learning theory, the computer can categorise the sounds of each key as it's struck and develop a good first guess with an accuracy of 60 per cent for characters, and 20 per cent for words," said Li Zhuang, lead author of the study. "We then use spelling and grammar checks to refine the results, which increased the character accuracy to 70 per cent and the word accuracy to 50 per cent. The text is somewhat readable at this point."

Moreover, after this has been achieved, the recording can be played back repeatedly in a feedback loop to "train" the computer to increase its accuracy until no significant improvement is seen. In the experiment, three feedback cycles were often enough to obtain recovery rates of 88 per cent for words and 96 per cent for characters. Once a system is trained, recovering the text becomes even more straightforward, even if the text isn't in English.

After just 20 attempts, researchers were able to retrieve 90 per cent of five-character passwords, 77 per cent of eight-character passwords and 69 per cent of 10-character passwords.

What was particularly striking about this study, the researchers said, was the ease with which the text could be recovered using off-the-shelf equipment. "We didn't need high-quality audio to accomplish this," said Feng Zhou, co-author of the study. "We just used a $10 microphone that can be easily purchased in almost any computer supply store."

So what's a PC user to do? Other than scanning one's surroundings for bugs or recording devices and making sure a room is soundproof, the researchers suggest that computer users need to rethink the use of typed passwords or even long passphrases for security.

"There are different forms of authentication that could be used, including smart cards, one-time password tokens or biometrics. That helps with passwords, but it doesn't help protect text documents we would want to keep classified. I'm not sure what the solution is, but it's important that we're aware of this vulnerability," added Tygar.

Copyright © 2005, ENN

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.