Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.
LanguageEnglish
Title of host publicationSecurity Protocols XXI - 21st International Workshop, Revised Selected Papers
EditorsB. Christianson , J. Malcolm , F. Stajano , J. Anderson , J. Bonneau
Place of PublicationBerlin
PublisherSpringer-Verlag
Pages152-160
Number of pages9
Volume8263
ISBN (Print)9783642417160
DOIs
Publication statusPublished - 1 Jan 2013
Event21st International Workshop on Security Protocols XXI - Cambridge, United Kingdom
Duration: 19 Mar 201320 Mar 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8263 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Workshop on Security Protocols XXI
CountryUnited Kingdom
CityCambridge
Period19/03/1320/03/13

Fingerprint

Fingerprinting
Vibration
Attack
Covert Channel

Keywords

  • sine wave
  • machine learning technique
  • security protocol
  • covert channel
  • threat model

Cite this

Nagaraja, S. (2013). Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion). In B. Christianson , J. Malcolm , F. Stajano , J. Anderson , & J. Bonneau (Eds.), Security Protocols XXI - 21st International Workshop, Revised Selected Papers (Vol. 8263 , pp. 152-160). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8263 LNCS). Berlin: Springer-Verlag. https://doi.org/10.1007/978-3-642-41717-7_17
Nagaraja, Shishir. / Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion). Security Protocols XXI - 21st International Workshop, Revised Selected Papers. editor / B. Christianson ; J. Malcolm ; F. Stajano ; J. Anderson ; J. Bonneau . Vol. 8263 Berlin : Springer-Verlag, 2013. pp. 152-160 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d3c4e87d4d494ada87b2e8a4c9334207,
title = "Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)",
abstract = "Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.",
keywords = "sine wave, machine learning technique, security protocol, covert channel, threat model",
author = "Shishir Nagaraja",
year = "2013",
month = "1",
day = "1",
doi = "10.1007/978-3-642-41717-7_17",
language = "English",
isbn = "9783642417160",
volume = "8263",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "152--160",
editor = "{Christianson }, B. and {Malcolm }, J. and {Stajano }, F. and {Anderson }, J. and {Bonneau }, J.",
booktitle = "Security Protocols XXI - 21st International Workshop, Revised Selected Papers",

}

Nagaraja, S 2013, Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion). in B Christianson , J Malcolm , F Stajano , J Anderson & J Bonneau (eds), Security Protocols XXI - 21st International Workshop, Revised Selected Papers. vol. 8263 , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8263 LNCS, Springer-Verlag, Berlin, pp. 152-160, 21st International Workshop on Security Protocols XXI, Cambridge, United Kingdom, 19/03/13. https://doi.org/10.1007/978-3-642-41717-7_17

Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion). / Nagaraja, Shishir.

Security Protocols XXI - 21st International Workshop, Revised Selected Papers. ed. / B. Christianson ; J. Malcolm ; F. Stajano ; J. Anderson ; J. Bonneau . Vol. 8263 Berlin : Springer-Verlag, 2013. p. 152-160 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8263 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)

AU - Nagaraja, Shishir

PY - 2013/1/1

Y1 - 2013/1/1

N2 - Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.

AB - Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.

KW - sine wave

KW - machine learning technique

KW - security protocol

KW - covert channel

KW - threat model

UR - http://www.scopus.com/inward/record.url?scp=84893409411&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-41717-7_17

DO - 10.1007/978-3-642-41717-7_17

M3 - Conference contribution book

SN - 9783642417160

VL - 8263

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 152

EP - 160

BT - Security Protocols XXI - 21st International Workshop, Revised Selected Papers

A2 - Christianson , B.

A2 - Malcolm , J.

A2 - Stajano , F.

A2 - Anderson , J.

A2 - Bonneau , J.

PB - Springer-Verlag

CY - Berlin

ER -

Nagaraja S. Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion). In Christianson B, Malcolm J, Stajano F, Anderson J, Bonneau J, editors, Security Protocols XXI - 21st International Workshop, Revised Selected Papers. Vol. 8263 . Berlin: Springer-Verlag. 2013. p. 152-160. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-41717-7_17