Feeds

Typing: music to fraudsters' ears

From keyboarding to frauding

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Computer users should learn to type silently if they don't want to reveal intimate details such as passwords, according to a new study Researchers at the University of California, Berkeley have discovered that a simple audio recording of keyboard clicks can betray what users have typed, possibly leading users to betray intimate details about their lives to virus writers and fraudsters.

In an experiment carried out at the university, computer scientists were able to take several 10-minute sound recordings of users typing, feed the audio into a computer and use an algorithm to recover up to 96 percent of the characters entered on a keyboard.

"It's a form of acoustical spying that should raise red flags among computer security and privacy experts," said Doug Tygar, UC Berkeley professor of computer science and information management and principal investigator of the study. "If we were able to figure this out, it's likely that people with less honourable intentions can - or have - as well."

According to the researchers, what makes the technique feasible is that each keystroke makes a relatively distinct sound, however subtle, when hit. Given that typical users type around 300 characters per minute, enough time is left for a computer to isolate individual keystrokes and categorise the letters based upon the statistical characteristics of English text. For example, the letters "th" will occur together more frequently than "tj," and the word "yet" is far more common than "yrg."

"Using statistical learning theory, the computer can categorise the sounds of each key as it's struck and develop a good first guess with an accuracy of 60 per cent for characters, and 20 per cent for words," said Li Zhuang, lead author of the study. "We then use spelling and grammar checks to refine the results, which increased the character accuracy to 70 per cent and the word accuracy to 50 per cent. The text is somewhat readable at this point."

Moreover, after this has been achieved, the recording can be played back repeatedly in a feedback loop to "train" the computer to increase its accuracy until no significant improvement is seen. In the experiment, three feedback cycles were often enough to obtain recovery rates of 88 per cent for words and 96 per cent for characters. Once a system is trained, recovering the text becomes even more straightforward, even if the text isn't in English.

After just 20 attempts, researchers were able to retrieve 90 per cent of five-character passwords, 77 per cent of eight-character passwords and 69 per cent of 10-character passwords.

What was particularly striking about this study, the researchers said, was the ease with which the text could be recovered using off-the-shelf equipment. "We didn't need high-quality audio to accomplish this," said Feng Zhou, co-author of the study. "We just used a $10 microphone that can be easily purchased in almost any computer supply store."

So what's a PC user to do? Other than scanning one's surroundings for bugs or recording devices and making sure a room is soundproof, the researchers suggest that computer users need to rethink the use of typed passwords or even long passphrases for security.

"There are different forms of authentication that could be used, including smart cards, one-time password tokens or biometrics. That helps with passwords, but it doesn't help protect text documents we would want to keep classified. I'm not sure what the solution is, but it's important that we're aware of this vulnerability," added Tygar.

Copyright © 2005, ENN

Beginner's guide to SSL certificates

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.