• DocumentCode
    39455
  • Title

    On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections

  • Author

    Raguram, R. ; White, Amanda M. ; Yi Xu ; Frahm, Jens ; Georgel, Pierre ; Monrose, F.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
  • Volume
    10
  • Issue
    3
  • fYear
    2013
  • fDate
    May-June 2013
  • Firstpage
    154
  • Lastpage
    167
  • Abstract
    We investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards. Specifically, we show that so-called compromising reflections (in, for example, a victim´s sunglasses) of a device´s screen are sufficient to enable automated reconstruction, from video, of text typed on a virtual keyboard. Through the use of advanced computer vision and machine learning techniques, we are able to operate under extremely realistic threat models, in real-world operating conditions, which are far beyond the range of more traditional OCR-based attacks. In particular, our system does not require expensive and bulky telescopic lenses: rather, we make use of off-the-shelf, handheld video cameras. In addition, we make no limiting assumptions about the motion of the phone or of the camera, nor the typing style of the user, and are able to reconstruct accurate transcripts of recorded input, even when using footage captured in challenging environments (e.g., on a moving bus). To further underscore the extent of this threat, our system is able to achieve accurate results even at very large distances-up to 61 m for direct surveillance, and 12 m for sunglass reflections. We believe these results highlight the importance of adjusting privacy expectations in response to emerging technologies.
  • Keywords
    computer vision; data privacy; image reconstruction; learning (artificial intelligence); lenses; mobile computing; telescopes; video cameras; video signal processing; virtual reality; OCR-based attacks; advanced computer vision; automatic typed input reconstruction; bulky telescopic lens; camera motion; compromising reflection; device screen; direct surveillance; emerging technologies; expensive telescopic lens; machine learning techniques; off-the-shelf handheld video cameras; personal mobile devices; phone motion; privacy expectations; privacy risk; real-world operating conditions; realistic threat models; sunglass reflections; transcript reconstruction; virtual keyboards; Computer security; Human factors; Mobile communication; Privacy; Privacy; compromising emanations; human factors; mobile devices; security; side-channel attack;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2013.16
  • Filename
    6509878