This research focuses on the vulnerability issues related to keystroke logging on a physical computer keyboard, known as Snooping Keystrokes. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, and key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results for the proposed pipeline show a peak accuracy of 98.3%.

A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm

Spata M. O.
;
Ortis A.;Battiato S.
2025-01-01

Abstract

This research focuses on the vulnerability issues related to keystroke logging on a physical computer keyboard, known as Snooping Keystrokes. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, and key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results for the proposed pipeline show a peak accuracy of 98.3%.
2025
Acoustic side channel attack
Deep learning
Laptop keystroke attacks
Snooping keystroke attacks
User security and privacy
Zoom-based acoustic attacks
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11769/661709
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact