A fast eavesdropping attack against touchscreens

作者: Federico Maggi , Alberto Volpatto , Simone Gasparini , Giacomo Boracchi , Stefano Zanero

DOI: 10.1109/ISIAS.2011.6122840

关键词:

摘要: The pervasiveness of mobile devices increases the risk exposing sensitive information on go. In this paper, we arise concern by presenting an automatic attack against modern touchscreen keyboards. We demonstrate Apple iPhone — 2010's most popular device although it can be adapted to other (e.g., Android) that employ similar key-magnifying Our processes stream frames from a video camera surveillance or portable camera) and recognizes keystrokes online, in fraction time needed perform same task direct observation offline analysis recorded video, which unfeasible for large amount data. detects, tracks, rectifies target touchscreen, thus following camera's movements eliminating possible perspective distortions rotations real-world settings, our automatically recognize up 97.07 percent (91.03 average), with 1.15 errors (3.16 average) at speed ranging 37 51 per minute.

参考文章(12)
Pedram Keyani, Mary Czerwinski, Desney S. Tan, Spy-resistant keyboard: more secure password entry on public touch screen displays australasian computer-human interaction conference. pp. 1- 10 ,(2005) , 10.5555/1108368.1108393
Geoffrey Thomas Kneebone, J. G. Semple, Algebraic projective geometry ,(1952)
Richard Hartley, Andrew Zisserman, Multiple view geometry in computer vision ,(2000)
Martin A. Fischler, Robert C. Bolles, Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography Communications of The ACM. ,vol. 24, pp. 381- 395 ,(1981) , 10.1145/358669.358692
Herbert Bay, Andreas Ess, Tinne Tuytelaars, Luc Van Gool, Speeded-Up Robust Features (SURF) Computer Vision and Image Understanding. ,vol. 110, pp. 346- 359 ,(2008) , 10.1016/J.CVIU.2007.09.014
M. Piccardi, Background subtraction techniques: a review systems, man and cybernetics. ,vol. 4, pp. 3099- 3104 ,(2004) , 10.1109/ICSMC.2004.1400815
Nobuyuki Otsu, A Threshold Selection Method from Gray-Level Histograms IEEE Transactions on Systems, Man, and Cybernetics. ,vol. 9, pp. 62- 66 ,(1979) , 10.1109/TSMC.1979.4310076
Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd, Reducing shoulder-surfing by using gaze-based password entry symposium on usable privacy and security. pp. 13- 19 ,(2007) , 10.1145/1280680.1280683
David L Donoho, Iain M Johnstone, Ideal spatial adaptation by wavelet shrinkage Biometrika. ,vol. 81, pp. 425- 455 ,(1994) , 10.1093/BIOMET/81.3.425