Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book


Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.
Original languageEnglish
Title of host publicationSecurity Protocols XXI - 21st International Workshop, Revised Selected Papers
EditorsB. Christianson , J. Malcolm , F. Stajano , J. Anderson , J. Bonneau
Place of PublicationBerlin
Number of pages9
ISBN (Print)9783642417160
Publication statusPublished - 1 Jan 2013
Event21st International Workshop on Security Protocols XXI - Cambridge, United Kingdom
Duration: 19 Mar 201320 Mar 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8263 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference21st International Workshop on Security Protocols XXI
CountryUnited Kingdom


  • sine wave
  • machine learning technique
  • security protocol
  • covert channel
  • threat model

Cite this