Side Channel Attacks through Acoustic Emanations

Slides:



Advertisements
Similar presentations
5-Minute Check on Activity 5-14 Click the mouse button or press the Space Bar to display the answers. Use the properties of logarithms or your calculator.
Advertisements

Yuri R. Tsoy, Vladimir G. Spitsyn, Department of Computer Engineering
SirenDetect Alerting Drivers about Emergency Vehicles Jennifer Michelstein Department of Electrical Engineering Adviser: Professor Peter Kindlmann May.
Neural Networks  A neural network is a network of simulated neurons that can be used to recognize instances of patterns. NNs learn by searching through.
Masters Presentation at Griffith University Master of Computer and Information Engineering Magnus Nilsson
What Makes Up a PC?. Objectives At the end of this session, you will be able to: List the various input devices.
Direct Attacks on Computational Devices
Chameleon: A Novel System for Defending Eavesdropping of Secret Information Saiyma Sarmin Department of Computer.
ECE 8443 – Pattern Recognition Objectives: Course Introduction Typical Applications Resources: Syllabus Internet Books and Notes D.H.S: Chapter 1 Glossary.
Introduction The aim the project is to analyse non real time EEG (Electroencephalogram) signal using different mathematical models in Matlab to predict.
Speech Sound Production: Recognition Using Recurrent Neural Networks Abstract: In this paper I present a study of speech sound production and methods for.
Brian Merrick CS498 Seminar.  Introduction to Neural Networks  Types of Neural Networks  Neural Networks with Pattern Recognition  Applications.
The Science of Digital Media Microsoft Surface 7May Metropolia University of Applied Sciences Display Technologies Seminar.
Top Level System Block Diagram BSS Block Diagram Abstract In today's expanding business environment, conference call technology has become an integral.
Presented by Li-Tal Mashiach Learning to Rank: A Machine Learning Approach to Static Ranking Algorithms for Large Data Sets Student Symposium.
4/25/2001ECE566 Philip Felber1 Speech Recognition A report of an Isolated Word experiment. By Philip Felber Illinois Institute of Technology April 25,
INPUT AND OUTPUT. -2 Competencies Define input Describe keyboard entry, pointing devices, & scanning devices Discuss image capturing devices, digitizing.
1 Security problems of your keyboard –Authentication based on key strokes –Compromising emanations consist of electrical, mechanical, or acoustical –Supply.
Classification of Music According to Genres Using Neural Networks, Genetic Algorithms and Fuzzy Systems.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Introduction ‘Have you ever played video games before? Look at the joystick movement. When you move the joystick to the left, the plane on the TV screen.
Text-To-Speech System for Marathi Miss. Deepa V. Kadam Indian Institute of Technology, Bombay.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Input and Output.
INPUT AND OUTPUT DEVICES BY CAMERPN MITCHELL. INPUT An input device is any hardware device that sends data to a computer, allowing users to interact with.
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
Alternative Parallel Processing Approaches Jonathan Sagabaen.
Security Fundamentals Group TEMPEST Security Hidema Tanaka.
Basic English for computing Unit 9 Graphical user interface IN THE NAME OF ALLAH.
Copyright John Wiley & Sons, Inc. Chapter 3 – Interactive Technologies HCI: Developing Effective Organizational Information Systems Dov Te’eni Jane.
Machine Learning. Learning agent Any other agent.
Inferno : Side-channel Attacks for Mobile Web Browsers Manuel Philipose, Matthew Halpern, Pavel Lifshits, Mark Silberstein, Mohit Tiwari Background and.
Artificial Intelligence Lecture No. 28 Dr. Asad Ali Safi ​ Assistant Professor, Department of Computer Science, COMSATS Institute of Information Technology.
Image Recognition using Hierarchical Temporal Memory Radoslav Škoviera Ústav merania SAV Fakulta matematiky, fyziky a informatiky UK.
Computer Parts There are many parts that work together to make a computer work.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
Cristian Urs and Ben Riveira. Introduction The article we chose focuses on improving the performance of Genetic Algorithms by: Use of predictive models.
 The most intelligent device - “Human Brain”.  The machine that revolutionized the whole world – “computer”.  Inefficiencies of the computer has lead.
Submitted by:- Alankar School:- UPS Sadholi Haria Block:- Rampur Maniharan Saharanpur.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
EMISSIONS SECURITY Elizabeth Eykman Supervisors:Stephen Gould & Matt Barrie.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Math 5 Professor Barnett Timothy G. McManus Anthony P. Pastoors.
1 Pattern Recognition: Statistical and Neural Lonnie C. Ludeman Lecture 24 Nov 2, 2005 Nanjing University of Science & Technology.
Introduction to Neural Networks and Example Applications in HCI Nick Gentile.
Indoor Location Detection By Arezou Pourmir ECE 539 project Instructor: Professor Yu Hen Hu.
Aibo companion DOAS – group 1 Aitor Azcarate Onaindia Abeer Mahdi
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Chapter 6 Digital Technologies in the Classroom Teaching and Learning with Technology.
Speech Lab, ECE, State University of New York at Binghamton  Classification accuracies of neural network (left) and MXL (right) classifiers with various.
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Presented By: Justin Rilling Written By: Martin Vuagnoux and Sylvain Pasini.
Project 2.A Extending NS-2 to support encryption/decryption Date: 04/07/2005 Course: CSCI 5931 Name: Sam Tran Tuan Nguyen.
Automatic Equalization for Live Venue Sound Systems Damien Dooley, Final Year ECE Progress To Date, Monday 21 st January 2008.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
RSA Key Extraction via Low- Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
ASSESSING SEARCH TERM STRENGTH IN SPOKEN TERM DETECTION Amir Harati and Joseph Picone Institute for Signal and Information Processing, Temple University.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Speech Recognition through Neural Networks By Mohammad Usman Afzal Mohammad Waseem.
Standard Input Devices
Teng Wei and Xinyu Zhang
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
My Smartphone knows what you print exploring smartphone-based side-channel attacks against 3d Printers Chen Song, feng lin, zongjie ba, kui ren, chi zhou,
Input and Output Devices
Applying Deep Neural Network to Enhance EMPI Searching
ARTIFICIAL NEURAL NETWORKS
Face Recognition and Detection Using Eigenfaces
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick.
Presentation transcript:

Side Channel Attacks through Acoustic Emanations Sharif University of Technology Department of Computer Engineering Side Channel Attacks through Acoustic Emanations Presented by: Amir Mahdi Hosseini Monazzah Mohammad Taghi Teymoori As: Course Seminar of Hardware Security and Trust Ord. 1393

Table of Contents Introduction Preliminaries How FFT helps us! How Neural Network helps us! Keyboard Acoustic Emanations Simulation System Setup and Results Conclusion and Future Work Introduction Preliminaries Keyboard … Simulation … Conc. … 1 Side Channel Attacks through Acoustic Emanations

Electromagnetic Emanations Attacks on the security of computer systems Electromagnetic Emanations Introduction Preliminaries Keyboard … Simulation … Conc. … 2 Side Channel Attacks through Acoustic Emanations

Optical Emanation Attacks on the security of computer systems Introduction Preliminaries Keyboard … Simulation … Conc. … 3 Side Channel Attacks through Acoustic Emanations

Acoustic Emanation Attacks on the security of computer systems Like the mentioned attacks, works on the pattern of (acoustic) signals This attack is inexpensive and non-invasive! Only need a simple microphone. Example attacks already implemented on Dot matrix printers Keyboard Introduction Preliminaries Keyboard … Simulation … Conc. … 4 Side Channel Attacks through Acoustic Emanations

How FFT Helps Us! Fourier analysis converts time (or space) to frequency and vice versa. FFT rapidly computes such transformations Introduction Preliminaries Keyboard … Simulation … Conc. … 5 Side Channel Attacks through Acoustic Emanations

How FFT Helps Us! (Cont.) The raw sound produced by key clicks is not a good input We need to extract relevant features of sound Introduction Preliminaries Keyboard … Simulation … Conc. … 6 Side Channel Attacks through Acoustic Emanations

How Neural Net. Helps Us! Artificial neural network is a computational model capable of pattern recognition. Classifies feature space Data: set of value pairs: (xt, yt), yt=g(xt); Objective: neural network represents the input / output transformation (a function) F Learning: learning means using a set of observations to find F which solves the task in some optimal sense Introduction Preliminaries Keyboard … Simulation … Conc. … 7 Side Channel Attacks through Acoustic Emanations

How Neural Net. Helps Us! (Cont.) Inputs Output w2 w1 w3 wn wn-1 x1 x2 x3 … xn-1 xn y Introduction Preliminaries Keyboard … Simulation … Conc. … 8 Side Channel Attacks through Acoustic Emanations

Attack Properties Based on the hypothesis that the sound of clicks might differ slightly from key to key Although the clicks of different keys sound similar to the human ear The network can be trained on one person and then used to eavesdrop on another person typing on the same keyboard Introduction Preliminaries Keyboard … Simulation … Conc. … 9 Side Channel Attacks through Acoustic Emanations

Attack Properties (Cont.) It is possible to train the network on one keyboard and then use it to attack another keyboard of the same type There is a reduction in the quality of recognition The clicks sound different because the keys are positioned at different positions on the keyboard plate Introduction Preliminaries Keyboard … Simulation … Conc. … 10 Side Channel Attacks through Acoustic Emanations

Signals Structure The click lasts for approximately 100 ms Peak of pushing the key Silence Peak of releasing the key Introduction Preliminaries Keyboard … Simulation … Conc. … 11 Side Channel Attacks through Acoustic Emanations

Flow of Experiment Recording the sound of pressed key Extract the push pick information Calculating the FFT of push pick Importing the information to neural network Train the neural network with various redundant information Test the neural network with random input Success Neural network trained successfully Create more accurate information No Yes Introduction Preliminaries Keyboard … Simulation … Conc. … 12 Side Channel Attacks through Acoustic Emanations

Motivational Example Capturing the voice of pressing ‘h’ key Capturing the voice of pressing ‘z’ key h z Introduction Preliminaries Keyboard … Simulation … Conc. … 13 Side Channel Attacks through Acoustic Emanations

Motivational Example Calculating the FFT of ‘h’ and ‘z’ signals h z Push Peak Silence Release Peak Introduction Preliminaries Keyboard … Simulation … Conc. … 14 Side Channel Attacks through Acoustic Emanations

Motivational Example (Cont.) Constructing the neural network and train it! Error Prob.=8.87e-9 MATLAB Code: … X=[Xz Xh]; T=[0 1]; net = newpr(X, T, 20); net = train(net, X, T); Introduction Preliminaries Keyboard … Simulation … Conc. … 15 Side Channel Attacks through Acoustic Emanations

System Setup Main Paper Java NNS neural network simulator Simple PC microphone for short distances up to 1 meter Parabolic microphone for eavesdropping from a distance IBM keyboard S/N 0953260, P/N 32P5100 Introduction Preliminaries Keyboard … Simulation … Conc. … 16 Side Channel Attacks through Acoustic Emanations

System Setup (Cont.) This Study MATLAB neural network simulator Simple PC microphone for short distances up to 1 meter A4TECH keyboard model KR-85 Introduction Preliminaries Keyboard … Simulation … Conc. … 17 Side Channel Attacks through Acoustic Emanations

Results No Mistake! 18 Alice: 17 20 Constant Force: 13 20 Bob: 15 20 Introduction Preliminaries Keyboard … Simulation … Conc. … Constant Force: 13 20 Variable Force: 17 20 Alice: 17 20 Bob: 15 20 Victor: 18 20 18 Side Channel Attacks through Acoustic Emanations

Summary We explored acoustic emanations of keyboard Like input devices to recognize the content being typed In the paper the attack was also applied to Notebook keyboards Telephone pads ATM pads Introduction Preliminaries Keyboard … Simulation … Conc. … 19 Side Channel Attacks through Acoustic Emanations

Summary (Cont.) A sound-free (non-mechanical) keyboard is an obvious countermeasure for the attack However, it is neither comfortable for users nor cheap! Introduction Preliminaries Keyboard … Simulation … Conc. … 20 Side Channel Attacks through Acoustic Emanations

Future Work Main Idea: Improving the accuracy of the results by using the combination of keyboard acoustic emanations and predictive text algorithms. Introduction Preliminaries Keyboard … Simulation … Conc. … Recording Acoustic Emanation of Keyboard Training Neural Network Activating the Eavesdropping System Processing the Results with Predictive Text Algorithms Generating the Text Result 21 Side Channel Attacks through Acoustic Emanations

Thanks for your attention 22 Side Channel Attacks through Acoustic Emanations

References Asonov, Dmitri, and Rakesh Agrawal. "Keyboard acoustic emanations." In IEEE Symposium on Security and Privacy, vol. 2004, pp. 3-11. 2004. Backes, Michael, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, and Caroline Sporleder. "Acoustic Side-Channel Attacks on Printers." In USENIX Security Symposium, pp. 307-322. 2010. Kuhn, Markus G. "Optical time-domain eavesdropping risks of CRT displays." In Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pp. 3-18. IEEE, 2002. Vuagnoux, Martin, and Sylvain Pasini. "Compromising Electromagnetic Emanations of Wired and Wireless Keyboards." In USENIX Security Symposium, pp. 1-16. 2009. Introduction Preliminaries Keyboard … Simulation … Conc. … 23 Side Channel Attacks through Acoustic Emanations