skip to main content
10.1145/2508859.2516709acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open Access

Seeing double: reconstructing obscured typed input from repeated compromising reflections

Published:04 November 2013Publication History

ABSTRACT

Of late, threats enabled by the ubiquitous use of mobile devices have drawn much interest from the research community. However, prior threats all suffer from a similar, and profound, weakness - namely the requirement that the adversary is either within visual range of the victim (e.g., to ensure that the pop-out events in reflections in the victim's sunglasses can be discerned) or is close enough to the target to avoid the use of expensive telescopes. In this paper, we broaden the scope of the attacks by relaxing these requirements and show that breaches of privacy are possible even when the adversary is around a corner. The approach we take overcomes challenges posed by low image resolution by extending computer vision methods to operate on small, high-noise, images. Moreover, our work is applicable to all types of keyboards because of a novel application of fingertip motion analysis for key-press detection. In doing so, we are also able to exploit reflections in the eyeball of the user or even repeated reflections (i.e., a reflection of a reflection of the mobile device in the eyeball of the user). Our empirical results show that we can perform these attacks with high accuracy, and can do so in scenarios that aptly demonstrate the realism of this threat.

References

  1. D. Asonov and R. Agrawal. Keyboard acoustic emanations. In Proceedings of the IEEE Symposium on Security and Privacy, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Backes, M. Durmuth, and D. Unruh. Compromising reflections-or-how to read LCD monitors around the corner. In Proceedings of the IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Backes, T. Chen, M. Dürmuth, H. Lensch, and M. Welk. Tempest in a teapot: Compromising reflections revisited. In Proceedings of the IEEE Symposium on Security and Privacy, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Baker and I. Matthews. Lucas-Kanade 20 years on. International Journal of Computer Vision, 56(3):221--255, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Balzarotti, M. Cova, and G. Vigna. ClearShot: Eavesdropping on keyboard input from video. In Proceedings of the IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In USENIX Workshop on Hot Topics in Security (HotSec), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Cai and H. Chen. On the practicality of motion based keystroke inference attack. Trust and Trustworthy Computing, pages 273--290, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Chaudhary, J. Raheja, and S. Raheja. A vision based geometrical method to find fingers positions in real time hand gesture recognition. Journal of Software, 7(4): 861--869, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  9. T. Chen and M.-Y. Kan. Creating a live, public short message service corpus: The NUS SMS corpus. Language Resources and Evaluation, 2011.Google ScholarGoogle Scholar
  10. R. Collins and R. Weiss. Vanishing point calculation as a statistical inference on the unit sphere. In Proceedings of the Third International Conference on Computer Vision, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. O. Duda and P. E. Hart. Use of the Hough transformation to detect lines and curves in pictures. Communications of the ACM, 15(1):11--15, 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. Elibol, U. Sarac, and I. Erer. Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system. In Proceedings of the 20th European Signal Processing Conference, 2012.Google ScholarGoogle Scholar
  13. M. Fischler and R. Bolles. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 24(6):381--395, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. N. Francis and H. Kucera. Brown corpus manual. Technical report, Dept. of Linguistics, Brown University, 1979.Google ScholarGoogle Scholar
  15. H. Grabner, M. Grabner, and H. Bischof. Real-time tracking via on-line boosting. In Proceedings of the British Machine Vision Conference, volume 1, pages 47--56, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  16. H. J. Highland. Electromagnetic radiation revisited. Computer Security, 5:85--93, June 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Hoanca and K. J. Mock. Password entry scheme resistant to eavesdropping. In Security and Management, 2008.Google ScholarGoogle Scholar
  18. X. Iturbe, A. Altuna, A. Ruiz de Olano, and I. Martinez. VHDL described finger tracking system for real-time human-machine interaction. In International Conference on Signals and Electronic Systems, 2008.Google ScholarGoogle Scholar
  19. L. Jin, D. Yang, L. Zhen, and J. Huang. A novel vision-based finger-writing character recognition system. Journal of Circuits, Systems, and Computers, 16(03):421--436, 2007.Google ScholarGoogle Scholar
  20. C. Kerdvibulvech and H. Saito. Vision-based detection of guitar players? fingertips without markers. In Computer Graphics, Imaging and Visualisation, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Kuhn and C. Kuhn. Compromising emanations: eavesdropping risks of computer displays. Technical report, University of Cambridge, 2003.Google ScholarGoogle Scholar
  22. M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd. Reducing shoulder-surfing by using gaze-based password entry. In Symposium on Usable Privacy and Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Lavie. Evaluating the output of machine translation systems. AMTA Tutorial, 2010.Google ScholarGoogle Scholar
  24. A. Lavie and M. J. Denkowski. The METEOR metric for automatic evaluation of machine translation. Machine Translation, 23(2--3):105--115, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Lee and J. Chun. Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. In Proceedings of the 2nd International Conference on Interaction Sciences, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. T. Lee and T. Hollerer. Handy AR: Markerless inspection of augmented reality objects using fingertip tracking. In IEEE International Symposium on Wearable Computers, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. E. Lutton, H. Maitre, and J. Lopez-Krahe. Contribution to the determination of vanishing points using Hough transform. Transactions on Pattern Analysis and Machine Intelligence, 16(4):430--438, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Magee and J. Aggarwal. Determining vanishing points from perspective images. Computer Vision, Graphics, and Image Processing, 26(2):256--267, 1984.Google ScholarGoogle Scholar
  29. F. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, and S. Zanero. A fast eavesdropping attack against touchscreens. In Information Assurance and Security (IAS). IEEE, 2011.Google ScholarGoogle Scholar
  30. J. Nakamura. Image sensors and signal processing for digital still cameras. CRC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. Nguyen, T. Pham, and J. Jeon. Fingertip detection with morphology and geometric calculation. In IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Oka, Y. Sato, and H. Koike. Real-time fingertip tracking and gesture recognition. Computer Graphics and Applications, 22(6):64--71, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Raguram, A. White, D. Goswami, F. Monrose, and J. Frahm. iSpy: automatic reconstruction of typed input from compromising reflections. In Proceedings of the ACM Conference on Computer and Communications Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. R. Raguram, A. M. White, Y. Xu, J.-M. Frahm, P. Georgel, and F. Monrose. On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections. IEEE Transactions on Dependable and Secure Computing, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. L. Sobrado and J.-C. Birget. Graphical passwords. The Rutgers Scholar, 4, 2002.Google ScholarGoogle Scholar
  37. E. Stelzer. Contrast, resolution, pixelation, dynamic range and signal-to-noise ratio: fundamental limits to resolution in fluorescence light microscopy. Journal of Microscopy, 189 (1):15--24, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  38. R. Szeliski. Image alignment and stitching: A tutorial. Foundations and Trends in Computer Graphics and Vision, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. D. S. Tan, P. Keyani, and M. Czerwinski. Spy-resistant keyboard: More secure password entry on public touch screen displays. In Proceedings of the 17th Australia Conference on Computer-Human Interaction, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. N. Ukita and M. Kidode. Wearable virtual tablet: fingertip drawing on a portable plane-object using an active-infrared camera. In Proceedings of the International Conference on Intelligent User Interfaces. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. W. van Eck. Electromagnetic radiation from video display units: an eavesdropping risk Computer Security, 4: 269--286, December 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A. Vedaldi and B. Fulkerson. VLFeat: An open and portable library of computer vision algorithms. In Proceedings of the International Conference on Multimedia, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In Proceedings of the 18th USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. J. Weaver, K. J. Mock, and B. Hoanca. Gaze-based password authentication through automatic clustering of gaze points. In IEEE International Conference on Systems, Man and Cybernetics, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  45. J. Weickert. Anisotropic diffusion in image processing, volume 1. Teubner Stuttgart, 1998.Google ScholarGoogle Scholar
  46. D. Yang, L. Jin, and J. Yin. An effective robust fingertip detection method for finger writing character recognition system. In Proceedings of the International Conference on Machine Learning and Cybernetics, 2005.Google ScholarGoogle Scholar
  47. Y. Zhang, P. Xia, J. Luo, Z. Ling, B. Liu, and X. Fu. Fingerprint attack against touch-enabled devices. In Security and Privacy in Smartphones and Mobile Devices, SPSM '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Z. Zhang. Vision-based interaction with fingers and papers. In Proceedings International Symposium on the CREST Digital Archiving Project, 2003.Google ScholarGoogle Scholar
  49. L. Zhuang, F. Zhou, and J. Tygar. Keyboard acoustic emanations revisited. In Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Seeing double: reconstructing obscured typed input from repeated compromising reflections

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
        November 2013
        1530 pages
        ISBN:9781450324779
        DOI:10.1145/2508859

        Copyright © 2013 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 November 2013

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '13 Paper Acceptance Rate105of530submissions,20%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader