AI System That Can Identify Sound of Keystrokes

AI System That Can Identify Sound of Keystrokes

AI System That Can Identify Sound of Keystrokes

AI System That Can Identify Sound of Keystrokes

A group of researchers from Durham, Surrey, and Royal Holloway have developed an artificial intelligence (AI) system that can accurately identify and catalog the sound of keystrokes. In a simulated cyberattack study, the scientists employed a deep learning model to classify laptop keystrokes using Zoom audio and a smartphone’s built-in microphone. This groundbreaking AI technology unveils a new type of security vulnerability in online communication platforms, potentially jeopardizing privacy during remote work and virtual meetings. The research emphasizes the need for strong encryption and security measures to prevent such potential breaches and ensure user safety on these platforms.

The AI classifier demonstrated remarkable accuracy, attaining a 95% success rate when trained on keystrokes captured by a nearby phone, and a 93% accuracy rate for those recorded via Zoom. The researchers stress the need for further exploration into the effectiveness of other inconspicuous recording techniques. These results provoke significant worries about user privacy and security, as cybercriminals could potentially abuse this technology to gain unauthorized access to confidential information. It is crucial for developers and organizations to put strong preventive measures in place to protect user data from emerging threats.

The researchers noted that advancements in deep learning technology have made acoustic side channel attacks (ASCAs) an increasingly significant risk to keyboards. These ASCAs can now efficiently analyze keystroke sounds to determine which keys are pressed, potentially revealing sensitive data such as passwords and private communications. Consequently, it is vital for individuals and organizations to be aware of this new threat and take necessary precautions to secure their information.

To reduce the likelihood of such attacks, the researchers suggest modifying typing habits, such as adopting touch typing, which lowered keystroke identification from 64% to 40%. Additionally, introducing breaks between words and varying typing patterns can further diminish the success rate of these intrusive techniques. Adopting diverse typing styles can not only boost overall typing efficiency but also substantially improve personal security.

Moreover, the researchers recommend using randomized passwords with mixed cases, applying sound-based countermeasures like adding false keystrokes to transmitted audio, and utilizing two-factor authentication for additional defense against these threats. Experts also underscore the importance of regularly updating software to ensure the latest patches and security features are active. They further emphasize the value of user awareness and training in detecting and mitigating potential vulnerabilities stemming from side-channel attacks.

See first source: FoxNews.com

FAQ

What is the purpose of the AI system developed by the researchers?

The AI system is designed to accurately identify and catalog the sound of keystrokes, unveiling a new type of security vulnerability in online communication platforms, such as Zoom, and potentially jeopardizing privacy during remote work and virtual meetings.

How accurate is the AI classifier?

The AI classifier demonstrated remarkable accuracy, attaining a 95% success rate when trained on keystrokes captured by a nearby phone, and a 93% accuracy rate for those recorded via Zoom.

What is an acoustic side channel attack (ASCA)?

An acoustic side channel attack (ASCA) is a technique that analyzes keystroke sounds to determine which keys are pressed, potentially revealing sensitive data such as passwords and private communications. Advancements in deep learning technology have made ASCAs an increasingly significant risk to keyboards.

How can typing habits be modified to reduce the likelihood of an ASCA?

Adopting touch typing can lower keystroke identification from 64% to 40%. Additionally, introducing breaks between words and varying typing patterns can further diminish the success rate of these intrusive techniques. Diverse typing styles can boost overall typing efficiency and improve personal security.

What other recommendations can help protect against ASCAs and other security threats?

Using randomized passwords with mixed cases, applying sound-based countermeasures like randomly generated false keystrokes, utilizing two-factor authentication, and regularly updating software can strengthen security. User awareness and training in detecting and mitigating potential vulnerabilities are also crucial.

Featured Image Credit: Clay Banks; Unsplash; Thank you!

Noah Nguyen

Noah Nguyen

Noah Nguyen is a multi-talented developer who brings a unique perspective to his craft. Initially a creative writing professor, he turned to Dev work for the ability to work remotely. He now lives in Seattle, spending time hiking and drinking craft beer with his fiancee.
Share the Post:
Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023,

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed

Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at the Lubiatowo-Kopalino site in Pomerania.

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will result in job losses. However,

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023, more than one-fifth of automobiles

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed are at the forefront because

Sunsets' Technique

Inside the Climate Battle: Make Sunsets’ Technique

On February 12, 2023, Luke Iseman and Andrew Song from the solar geoengineering firm Make Sunsets showcased their technique for injecting sulfur dioxide (SO₂) into the stratosphere as a means

AI Adherence Prediction

AI Algorithm Predicts Treatment Adherence

Swoop, a prominent consumer health data company, has unveiled a cutting-edge algorithm capable of predicting adherence to treatment in people with Multiple Sclerosis (MS) and other health conditions. Utilizing artificial

Personalized UX

Here’s Why You Need to Use JavaScript and Cookies

In today’s increasingly digital world, websites often rely on JavaScript and cookies to provide users with a more seamless and personalized browsing experience. These key components allow websites to display

Geoengineering Methods

Scientists Dimming the Sun: It’s a Good Thing

Scientists at the University of Bern have been exploring geoengineering methods that could potentially slow down the melting of the West Antarctic ice sheet by reducing sunlight exposure. Among these

why startups succeed

The Top Reasons Why Startups Succeed

Everyone hears the stories. Apple was started in a garage. Musk slept in a rented office space while he was creating PayPal with his brother. Facebook was coded by a

Bold Evolution

Intel’s Bold Comeback

Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as opposed to the 176% return

Semiconductor market

Semiconductor Slump: Rebound on the Horizon

In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024 approaches, the industry seems to

Elevated Content Deals

Elevate Your Content Creation with Amazing Deals

The latest Tech Deals cater to creators of different levels and budgets, featuring a variety of computer accessories and tools designed specifically for content creation. Enhance your technological setup with

Learn Web Security

An Easy Way to Learn Web Security

The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security. These carefully designed learning courses

Military Drones Revolution

Military Drones: New Mobile Command Centers

The Air Force Special Operations Command (AFSOC) is currently working on a pioneering project that aims to transform MQ-9 Reaper drones into mobile command centers to better manage smaller unmanned

Tech Partnership

US and Vietnam: The Next Tech Leaders?

The US and Vietnam have entered into a series of multi-billion-dollar business deals, marking a significant leap forward in their cooperation in vital sectors like artificial intelligence (AI), semiconductors, and

Huge Savings

Score Massive Savings on Portable Gaming

This week in tech bargains, a well-known firm has considerably reduced the price of its portable gaming device, cutting costs by as much as 20 percent, which matches the lowest

Cloudfare Protection

Unbreakable: Cloudflare One Data Protection Suite

Recently, Cloudflare introduced its One Data Protection Suite, an extensive collection of sophisticated security tools designed to protect data in various environments, including web, private, and SaaS applications. The suite

Drone Revolution

Cool Drone Tech Unveiled at London Event

At the DSEI defense event in London, Israeli defense firms exhibited cutting-edge drone technology featuring vertical-takeoff-and-landing (VTOL) abilities while launching two innovative systems that have already been acquired by clients.

2D Semiconductor Revolution

Disrupting Electronics with 2D Semiconductors

The rapid development in electronic devices has created an increasing demand for advanced semiconductors. While silicon has traditionally been the go-to material for such applications, it suffers from certain limitations.

Cisco Growth

Cisco Cuts Jobs To Optimize Growth

Tech giant Cisco Systems Inc. recently unveiled plans to reduce its workforce in two Californian cities, with the goal of optimizing the company’s cost structure. The company has decided to

FAA Authorization

FAA Approves Drone Deliveries

In a significant development for the US drone industry, drone delivery company Zipline has gained Federal Aviation Administration (FAA) authorization, permitting them to operate drones beyond the visual line of

Mortgage Rate Challenges

Prop-Tech Firms Face Mortgage Rate Challenges

The surge in mortgage rates and a subsequent decrease in home buying have presented challenges for prop-tech firms like Divvy Homes, a rent-to-own start-up company. With a previous valuation of

Lighthouse Updates

Microsoft 365 Lighthouse: Powerful Updates

Microsoft has introduced a new update to Microsoft 365 Lighthouse, which includes support for alerts and notifications. This update is designed to give Managed Service Providers (MSPs) increased control and

Website Lock

Mysterious Website Blockage Sparks Concern

Recently, visitors of a well-known resource website encountered a message blocking their access, resulting in disappointment and frustration among its users. While the reason for this limitation remains uncertain, specialists