Liu et al. [2] proposed a keystroke inference systems called
WiKey, which uses the CSI waveform pattern generated by
finger’s unique motion to distinguish keystrokes on a exter-
nal keyboard. Compared with our work, WiKey works on
the OKI keystroke inference model and it can not recognize
the sensitive input windows. Zhang et al. [24] also pre-
sented WiPass, which can work in mobile device to detect
the graphical unlock passwords.
9. CONCLUSION AND FUTURE WORK
In this paper, we have designed and evaluated a novel
side-channel attack based on CSI which can infer victim’s
input on smartphone via WiFi signals. Our evaluation shows
that our attack can work well in recognizing the victim’s
password on smart phones. Compared with the previous
side channel based keystroke inference work, WindTalker
neither deploys external devices close to the target device
nor compromises the target device. It can even be launched
behind the victim without the requirement of visually seeing
the smart phone user’s input process, backside motion, or
installing any malware on the tablet. Due to the limitation
of Intel 5300 NIC, the current WindTalker cannot work for
iOS smartphones, which will be a part of our future work.
We will investigate how to further improve the inference
accuracy of WindTalker under different environments.
Acknowledgments
This work is supported by National Science Foundation of
China (No. 61272444, U1401253, U1405251, 61411146001)
and National Science Foundation (No. 1527144, No. 1553304,
No. 1618893).
10. REFERENCES
[1] IEEE Std. 802.11n-2009: Enhancements for higher
throughput. http://www.ieee802.org, 2009.
[2] Ali, K., Liu, A. X., Wang, W., and Shahzad, M.
Keystroke recognition using wifi signals. In Proceedings of
the 21st Annual International Conference on Mobile
Computing and Networking (2015), ACM, pp. 90–102.
[3] Balzarotti, D., Cova, M., and Vigna, G. Clearshot:
Eavesdropping on keyboard input from video. In Security
and Privacy, 2008. SP 2008. IEEE Symposium on (2008),
IEEE, pp. 170–183.
[4] Benko, H., Wilson, A. D., and Baudisch, P. Precise
selection techniques for multi-touch screens. In Proceedings
of the SIGCHI conference on Human Factors in computing
systems (2006), ACM, pp. 1263–1272.
[5] Cheng, N., Wang, X., Cheng, W., Mohapatra, P., and
Seneviratne, A. Characterizing privacy leakage of public
wifi networks for users on travel. In INFOCOM, 2013
Proceedings IEEE (2013), IEEE, pp. 2769–2777.
[6] Fan, Y., Jiang, Y., Zhu, H., and Shen, X. S. An efficient
privacy-preserving scheme against traffic analysis attacks in
network coding. In INFOCOM 2009, IEEE (2009), IEEE,
pp. 2213–2221.
[7] Forlines, C., Wigdor, D., Shen, C., and Balakrishnan,
R. Direct-touch vs. mouse input for tabletop displays. In
Proceedings of the SIGCHI conference on Human factors
in computing systems (2007), ACM, pp. 647–656.
[8] Halperin, D., Hu, W., Sheth, A., and Wetherall, D.
Tool release: gathering 802.11 n traces with channel state
information. ACM SIGCOMM Computer Communication
Review 41, 1 (2011), 53–53.
[9] Hamed, K. H., and Rao, A. R. A modified mann-kendall
trend test for autocorrelated data. Journal of Hydrology
204, 1 (1998), 182–196.
[10] Holt,C.C.Forecasting seasonals and trends by
exponentially weighted moving averages. International
journal of forecasting 20, 1 (2004), 5–10.
[11] Konings, B., Bachmaier, C., Schaub, F., and Weber,
M. Device names in the wild: Investigating privacy risks of
zero configuration networking. In Mobile Data Management
(MDM), 2013 IEEE 14th International Conference on
(2013), vol. 2, IEEE, pp. 51–56.
[12] Liu,J.,Wang,Y.,Kar,G.,Chen,Y.,Yang,J.,and
Gruteser, M. Snooping keystrokes with mm-level audio
ranging on a single phone. In Proceedings of the 21st
Annual International Conference on Mobile Computing
and Networking (2015), ACM, pp. 142–154.
[13] Liu, X., Zhou, Z., Diao, W., Li, Z., and Zhang, K. When
good becomes evil: Keystroke inference with smartwatch.
In Proceedings of the 22nd ACM SIGSAC Conference on
Computer and Communications Security (2015), ACM,
pp. 1273–1285.
[14] Lozowski, E., Charlton, R., Nguyen, C., and Wilson,
J. The use of cumulative monthly mean temperature
anomalies in the analysis of local interannual climate
variability. Journal of Climate 2, 9 (1989), 1059–1068.
[15] Mar
quardt, P., Verma, A., Carter, H., and Traynor,
P. (sp)
iphone: decoding vibrations from nearby keyboards
using mobile phone accelerometers. In Proceedings of the
18th ACM conference on Computer and communications
security (2011), ACM, pp. 551–562.
[16] Owusu, E., Han, J., Das, S., Perrig, A., and Zhang, J.
Accessory: password inference using accelerometers on
smartphones. In Proceedings of the Twelfth Workshop on
Mobile Computing Systems & Applications (2012), pp. 1–6.
[17] Sen, S., Lee, J., Kim, K.-H., and Congdon, P. Avoiding
multipath to revive inbuilding wifi localization. In
Proceeding of the 11th annual international conference on
Mobile systems, applications, and services (2013), ACM,
pp. 249–262.
[18] Shukla, D., Kumar, R., Serwadda, A., and Phoha,
V. V. Beware, your hands reveal your secrets! In
Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security (2014), ACM,
pp. 904–917.
[19] Sun, J., Jin, X., Chen, Y., Zhang, J., Zhang, R., and
Zhang, Y. Visible: Video-assisted keystroke inference from
tablet backside motion.
[20] Wang,F.,Cao,X.,Ren,X.,andIrani,P.Detecting and
leveraging finger orientation for interaction with
direct-touch surfaces. In Proceedings of the 22nd annual
ACM symposium on User interface software and
technology (2009), ACM, pp. 23–32.
[21] Xia, N., Song, H. H., Liao, Y., Iliofotou, M., Nucci,
A., Zhang, Z.-L., and Kuzmanovic, A. Mosaic:
Quantifying privacy leakage in mobile networks. In ACM
SIGCOMM Computer Communication Review (2013),
vol. 43, ACM, pp. 279–290.
[22] Xie,Y.,Li,Z.,andLi,M.Precise power delay profiling
with commodity wifi. In Proceedings of the 21st Annual
International Conference on Mobile Computing and
Networking (New York, NY, USA, 2015), MobiCom ’15,
ACM, pp. 53–64.
[23] Yue, Q., Ling, Z., Fu, X., Liu, B., Ren, K., and Zhao,
W. Blind recognition of touched keys on mobile devices. In
Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security (2014), ACM,
pp. 1403–1414.
[24] Zhang, J., Zheng, X., Tang, Z., Xing, T., Chen, X.,
Fang, D., Li, R., Gong, X., and Chen, F. Privacy leakage
in mobile sensing: your unlock passwords can be leaked
through wireless hotspot functionality.
[25] Zhu, T., Ma, Q., Zhang, S., and Liu, Y. Context-free
attacks using keyboard acoustic emanations. In Proceedings
of the 2014 ACM SIGSAC Conference on Computer and
Communications Security (2014), ACM, pp. 453–464.