Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)

Shishir Nagaraja*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Good morning everybody, my name is Shishir Nagaraja, and I’m from the University of Birmingham. Welcome to the talk. This is a fairly practical talk where we are looking at vibration-based covert channels. The basic idea is very simple. You’ve got a phone, it sits next to a keyboard (laptop or conventional), when you press the keys, the phone tells you what keys were pressed by analysing the corresponding vibrations. OK, so that’s a fairly simple setup.
Original languageEnglish
Title of host publicationSecurity Protocols XXI - 21st International Workshop, Revised Selected Papers
EditorsB. Christianson , J. Malcolm , F. Stajano , J. Anderson , J. Bonneau
Place of PublicationBerlin
PublisherSpringer-Verlag
Pages152-160
Number of pages9
Volume8263
ISBN (Print)9783642417160
DOIs
Publication statusPublished - 1 Jan 2013
Event21st International Workshop on Security Protocols XXI - Cambridge, United Kingdom
Duration: 19 Mar 201320 Mar 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8263 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Workshop on Security Protocols XXI
Country/TerritoryUnited Kingdom
CityCambridge
Period19/03/1320/03/13

Keywords

  • sine wave
  • machine learning technique
  • security protocol
  • covert channel
  • threat model

Fingerprint

Dive into the research topics of 'Simple defences against vibration-based keystroke fingerprinting attacks (Transcript of discussion)'. Together they form a unique fingerprint.

Cite this