论文标题
热(和混合热/音频)在键盘输入上侧向通道攻击
Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input
论文作者
论文摘要
迄今为止,还没有对键盘的热曲线进行系统的调查,因此尚未努力确保其确保它们。这是我们从键盘热发射中构建密码收集的手段的主要动机。具体来说,我们介绍了Thermanator:一种基于用户在典型的外部(塑料)键盘上输入密码引起的热传输的新的事后内幕攻击。 我们进行并描述了一项用户研究,该用户研究收集了30位用户的热残留物,其中输入了4个受欢迎的商品键盘上的10个独特密码(弱和强)。结果表明,在初始密码输入后30秒钟后,非专家用户可以恢复整个密钥压力,而进入后1分钟后可以恢复部分集合。但是,热残留侧通道缺乏有关密码长度,重复的密钥压力和键盘订购的信息。为了克服这些局限性,我们利用键盘声发射并结合两者来产生Acutherm,这是对键盘上的首次混合侧渠道攻击。 Acutherm可大大减少密码搜索,而无需对受害者打字进行任何培训。我们报告了基于涉及19个主题的用户研究的许多代表密码收集的结果。 这项工作的要点是三个方面:(1)使用塑料键盘输入秘密(例如密码和引脚)的安全性甚至不如先前所认识到的,(2)事后热成像攻击是现实的,(3)混合(多个侧向通道)既现实又有效。
To date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator: a new post-factum insider attack based on heat transfer caused by a user typing a password on a typical external (plastic) keyboard. We conduct and describe a user study that collected thermal residues from 30 users entering 10 unique passwords (both weak and strong) on 4 popular commodity keyboards. Results show that entire sets of key-presses can be recovered by non-expert users as late as 30 seconds after initial password entry, while partial sets can be recovered as late as 1 minute after entry. However, the thermal residue side-channel lacks information about password length, duplicate key-presses, and key-press ordering. To overcome these limitations, we leverage keyboard acoustic emanations and combine the two to yield AcuTherm, the first hybrid side-channel attack on keyboards. AcuTherm significantly reduces password search without the need for any training on the victim's typing. We report results gathered for many representative passwords based on a user study involving 19 subjects. The takeaway of this work is three-fold: (1) using plastic keyboards to enter secrets (such as passwords and PINs) is even less secure than previously recognized, (2) post-factum thermal imaging attacks are realistic, and (3) hybrid (multiple side-channel) attacks are both realistic and effective.