AI Listens to Keystrokes, Updated

AI Listens to Keystrokes, Updated

Keystroke Exposure

A recent study by Cornell University has disclosed that artificial intelligence (AI) can “listen” to users’ keystrokes, enabling it to predict their passwords with up to 95% accuracy. The AI system was trained on audio recordings of people typing on keyboards, as it learned to identify the distinct sounds generated by each key.

What About My Privacy?

This groundbreaking discovery raises concerns about the potential security risks of AI being utilized in cyber-attacks and highlights the importance of strengthening safeguards in place.

It also emphasizes the need for individuals to adopt strong and unique password strategies and use multi-factor authentications to minimize risks associated with password-related breaches.

Testing the AI System

The researchers evaluated the AI system using a phone’s built-in microphone positioned 17 centimeters from a 2021 MacBook Pro and during Zoom and Skype calls. With these methods, the system attained password identification accuracy rates of 95%, 93%, and 91.7%, respectively.

The high success rate of the AI system emphasizes the potential vulnerability of using passwords during online communications. Users are advised to remain conscious of their surroundings and consider alternative security measures when entering sensitive information during such calls.

Common Oversights in Your Privacy

The research highlights that people frequently hide their screens when inputting passwords but seldom attempt to conceal the sounds produced by their keystrokes. Developments in microphone technology and deep learning have rendered acoustic attacks on keyboards more viable.

Many individuals remain unaware of the potential risks associated with insufficient attention to the audible aspects of typing. It is crucial to promote public awareness about these threats while also encouraging the implementation of more secure technological solutions to prevent acoustic attacks.

Keystroke Analysis Breakthrough

In the study, researchers hit 36 laptop keys 25 times each, modifying the pressure and fingers employed, while the AI assessed the waveform, intensity, and timing of the keystrokes.

The AI could accurately identify the specific keys being pressed with remarkable precision. This breakthrough in keystroke analysis could potentially have a wide range of applications, from improving typing software to enhancing security and authentication systems.

Acoustic-Based Side-Channel Attacks

This kind of cyberattack, referred to as an “acoustic-based side-channel attack,” has existed for decades and involves obtaining sensitive data through unintended sound emissions or vibrations.

Typically, these attacks exploit fluctuations in electronic components such as capacitors, which emit subtle noises called “coil whine.” As technology advances, attackers continue to refine their techniques and develop new methods to infiltrate systems, making it crucial for hardware and software developers to stay vigilant and enhance security measures.

Safeguarding Devices and Personal Data

The growing dependence on smartphones and laptops heightens the risk of such attacks. In real-world situations, malware present on a nearby device with a microphone could acquire users’ keystroke information.

As a result, it has become increasingly important for individuals to take necessary precautions to safeguard their devices and personal data. By regularly updating software, utilizing strong antivirus programs, and being cautious about sharing sensitive information, users can mitigate potential risks related to malware and cyberattacks.

Strengthening Password Combinations

To protect against these attacks, the study recommends changing typing habits and using password combinations that include uppercase and lowercase letters. Incorporating numbers and special characters can also increase the strength and complexity of passwords, making them more difficult for attackers to decipher.

Additionally, utilizing tools like password managers can aid in securely storing unique passwords for various platforms, reducing the likelihood of unauthorized access due to predictable or identical passwords being used across different accounts.

Looking Ahead

Additionally, researchers are investigating “silent alternatives” to conventional keyboards as a possible solution for improved cybersecurity. These alternatives are focused on providing a more discreet and secure method of inputting information, effectively minimizing the risks associated with eavesdropping and hacking attempts.

Some promising technologies being explored include virtual keyboards, thought-controlled systems, and biometric authentication methods, all of which have the potential to significantly enhance user privacy.

FAQs

What did the Cornell University study discover?

The study found that AI can predict passwords up to 95% accuracy by “listening” to users’ keystrokes. The AI system was trained on audio recordings of people typing on keyboards, learning to identify the distinct sounds generated by each key.

How was the AI system tested?

The researchers evaluated the AI using a phone’s built-in microphone placed 17 centimeters from a 2021 MacBook Pro and during Zoom and Skype calls. The system accurately identified passwords with rates of 95%, 93%, and 91.7%, respectively.

Why don’t people pay attention to the audible aspects of typing?

Many individuals remain unaware of the potential risks associated with insufficient attention to the audible aspects of typing, as they usually focus on hiding their screens when inputting passwords. More public awareness is needed to address this issue.

What are acoustic-based side-channel attacks?

Acoustic-based side-channel attacks involve obtaining sensitive data through electronic components’ unintended sound emissions or vibrations. They have existed for decades, and attackers continue to refine their techniques as technology advances.

How can users protect themselves from these attacks?

Users can safeguard their devices and personal data by updating software regularly, utilizing strong antivirus programs, being cautious about sharing sensitive information, and adopting strong, unique passwords for their different accounts.

What are some password best practices?

Using password combinations that include both uppercase and lowercase letters, incorporating numbers and special characters, and utilizing tools like password managers can increase password strength and help protect against unauthorized access.

What are some silent alternatives for improved cybersecurity?

Researchers are investigating options such as virtual keyboards, thought-controlled systems, and biometric authentication methods to provide more discreet and secure ways of inputting information, reducing the risks associated with eavesdropping and hacking attempts.

First Reported on: foxnews.com
Featured Image provided by: Pexels – Thank you!

Noah Nguyen

Noah Nguyen

Noah Nguyen is a multi-talented developer who brings a unique perspective to his craft. Initially a creative writing professor, he turned to Dev work for the ability to work remotely. He now lives in Seattle, spending time hiking and drinking craft beer with his fiancee.
Share the Post:
Netanyahu Musk AI

Netanyahu and Musk Discuss AI Future

On September 22, 2023, Israeli Prime Minister Benjamin Netanyahu met with entrepreneur Elon Musk in San Francisco prior to attending the United Nations. In a

Urban Gardening

Creating Thriving Cities Through Urban Gardening

The rising popularity of urban gardening is receiving increased recognition for its numerous advantages, as demonstrated in a recent study featured in the Environmental Research

Romanian Energy Security

Eastern Europe is Achieving Energy Security

Canada and Romania have solidified their commitment to energy security and independence from Russian energy exports by signing a $3-billion export development agreement. The deal

Seamless Integration

Unlocking Seamless Smart Home Integration

The vision of an intelligently organized and interconnected smart home that conserves time, energy, and resources has long been desired by many homeowners. However, this

Netanyahu Musk AI

Netanyahu and Musk Discuss AI Future

On September 22, 2023, Israeli Prime Minister Benjamin Netanyahu met with entrepreneur Elon Musk in San Francisco prior to attending the United Nations. In a live-streamed discussion, Netanyahu lauded Musk

Urban Gardening

Creating Thriving Cities Through Urban Gardening

The rising popularity of urban gardening is receiving increased recognition for its numerous advantages, as demonstrated in a recent study featured in the Environmental Research Letters journal. Carried out by

What You Need to Know About Cloud Security Strategies

What You Need to Know About Cloud Security Strategies

Today, many businesses are adopting cloud computing services. As a result, it’s important to recognize that security measures for data in the cloud are different from those in traditional on-premises

Romanian Energy Security

Eastern Europe is Achieving Energy Security

Canada and Romania have solidified their commitment to energy security and independence from Russian energy exports by signing a $3-billion export development agreement. The deal is centered on constructing two

Seamless Integration

Unlocking Seamless Smart Home Integration

The vision of an intelligently organized and interconnected smart home that conserves time, energy, and resources has long been desired by many homeowners. However, this aspiration has often been hindered

New Algorithm

MicroAlgo’s Groundbreaking Algorithm

MicroAlgo Inc. has revealed the creation of a knowledge-augmented backtracking search algorithm, developed through extensive research in evolutionary computational techniques. The algorithm is designed to boost problem-solving effectiveness, precision, and

Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at the Lubiatowo-Kopalino site in Pomerania.

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will result in job losses. However,

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023, more than one-fifth of automobiles

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed are at the forefront because

Sunsets' Technique

Inside the Climate Battle: Make Sunsets’ Technique

On February 12, 2023, Luke Iseman and Andrew Song from the solar geoengineering firm Make Sunsets showcased their technique for injecting sulfur dioxide (SO₂) into the stratosphere as a means

AI Adherence Prediction

AI Algorithm Predicts Treatment Adherence

Swoop, a prominent consumer health data company, has unveiled a cutting-edge algorithm capable of predicting adherence to treatment in people with Multiple Sclerosis (MS) and other health conditions. Utilizing artificial

Personalized UX

Here’s Why You Need to Use JavaScript and Cookies

In today’s increasingly digital world, websites often rely on JavaScript and cookies to provide users with a more seamless and personalized browsing experience. These key components allow websites to display

Geoengineering Methods

Scientists Dimming the Sun: It’s a Good Thing

Scientists at the University of Bern have been exploring geoengineering methods that could potentially slow down the melting of the West Antarctic ice sheet by reducing sunlight exposure. Among these

why startups succeed

The Top Reasons Why Startups Succeed

Everyone hears the stories. Apple was started in a garage. Musk slept in a rented office space while he was creating PayPal with his brother. Facebook was coded by a

Bold Evolution

Intel’s Bold Comeback

Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as opposed to the 176% return

Semiconductor market

Semiconductor Slump: Rebound on the Horizon

In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024 approaches, the industry seems to

Elevated Content Deals

Elevate Your Content Creation with Amazing Deals

The latest Tech Deals cater to creators of different levels and budgets, featuring a variety of computer accessories and tools designed specifically for content creation. Enhance your technological setup with

Learn Web Security

An Easy Way to Learn Web Security

The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security. These carefully designed learning courses

Military Drones Revolution

Military Drones: New Mobile Command Centers

The Air Force Special Operations Command (AFSOC) is currently working on a pioneering project that aims to transform MQ-9 Reaper drones into mobile command centers to better manage smaller unmanned

Tech Partnership

US and Vietnam: The Next Tech Leaders?

The US and Vietnam have entered into a series of multi-billion-dollar business deals, marking a significant leap forward in their cooperation in vital sectors like artificial intelligence (AI), semiconductors, and

Huge Savings

Score Massive Savings on Portable Gaming

This week in tech bargains, a well-known firm has considerably reduced the price of its portable gaming device, cutting costs by as much as 20 percent, which matches the lowest

Cloudfare Protection

Unbreakable: Cloudflare One Data Protection Suite

Recently, Cloudflare introduced its One Data Protection Suite, an extensive collection of sophisticated security tools designed to protect data in various environments, including web, private, and SaaS applications. The suite