DocumentCode :
39455
Title :
On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
Author :
Raguram, R. ; White, Amanda M. ; Yi Xu ; Frahm, Jens ; Georgel, Pierre ; Monrose, F.
Author_Institution :
Dept. of Comput. Sci., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
Volume :
10
Issue :
3
fYear :
2013
fDate :
May-June 2013
Firstpage :
154
Lastpage :
167
Abstract :
We investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards. Specifically, we show that so-called compromising reflections (in, for example, a victim´s sunglasses) of a device´s screen are sufficient to enable automated reconstruction, from video, of text typed on a virtual keyboard. Through the use of advanced computer vision and machine learning techniques, we are able to operate under extremely realistic threat models, in real-world operating conditions, which are far beyond the range of more traditional OCR-based attacks. In particular, our system does not require expensive and bulky telescopic lenses: rather, we make use of off-the-shelf, handheld video cameras. In addition, we make no limiting assumptions about the motion of the phone or of the camera, nor the typing style of the user, and are able to reconstruct accurate transcripts of recorded input, even when using footage captured in challenging environments (e.g., on a moving bus). To further underscore the extent of this threat, our system is able to achieve accurate results even at very large distances-up to 61 m for direct surveillance, and 12 m for sunglass reflections. We believe these results highlight the importance of adjusting privacy expectations in response to emerging technologies.
Keywords :
computer vision; data privacy; image reconstruction; learning (artificial intelligence); lenses; mobile computing; telescopes; video cameras; video signal processing; virtual reality; OCR-based attacks; advanced computer vision; automatic typed input reconstruction; bulky telescopic lens; camera motion; compromising reflection; device screen; direct surveillance; emerging technologies; expensive telescopic lens; machine learning techniques; off-the-shelf handheld video cameras; personal mobile devices; phone motion; privacy expectations; privacy risk; real-world operating conditions; realistic threat models; sunglass reflections; transcript reconstruction; virtual keyboards; Computer security; Human factors; Mobile communication; Privacy; Privacy; compromising emanations; human factors; mobile devices; security; side-channel attack;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2013.16
Filename :
6509878
Link To Document :
بازگشت