• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Keystroke Emanations

Keystroke Emanations & Side Channel Attacks

Keystroke emanations have been found to leak information through side channels. This information can be exploited via side channel attacks for nefarious purpose. Such attacks fall in the category of side channel attacks that tend to exploit the physical implementation of the deployed security mechanism rather than using brute force or algorithmic weakness inherent in the mechanism.
We have set out to investigate acoustic side channel attacks using keystroke emanations in the context of passwords and other sensitive information (e.g. credit card data, SSN, ATM PIN). We study these attacks in different scenarios that closely resemble real world situations. We also explore remote eavesdropping scenarios where VoIP applications can be exploited to overhear the keystroke emanations that can later be used to extract confidential information.

Figure1: Acoustic eavesdropping attack model for keystroke emanations.

Figure1: Acoustic eavesdropping attack model for keystroke emanations.


We also focus on designing a competent defense system that can help contain the privacy breach due to side channel attacks. For acoustic side channel attack, we are researching signal-masking techniques that can cloak the keystroke emanations making it hard for an attack to exploit the audio leakage due to the emanations. The masking signal is played as a background noise at an appropriate volume for decreasing the signal to noise ratio, making it harder to isolate the keystroke emanations. Such defense measures are also tested for their effectiveness under multiple scenarios and for their usability, as the users should not be distracted from their work while the masking signal is being played.

Figure 2: Defense model involving the use of masking signal to cloak keystroke emanations.

Figure 2: Defense model involving the use of masking signal to cloak keystroke emanations.

People

Faculty

  • Nitesh Saxena

Student

  • S Abhishek Anand (PhD candidate)

Publication

  • Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses.
    Abhishek Anand and Nitesh Saxena
    In ACM Conference on Data and Application Security and Privacy (CODASPY), March 2018..
    [pdf]
  • A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.
    S Abhishek Anand and Nitesh Saxena.
    In Financial Cryptography and Data Security(FC16), February 2016.
    [pdf]

Media Coverage

  • Research proposes background noise to prevent side channel attacks on computer keyboards, TechXplore, Sep 27, 2016
  • Research proposes background noise to prevent side channel attacks on computer keyboards, UAB News, Sep 26, 2016
  • Research proposes background noise to prevent side channel attacks on computer keyboards, WN.com, Sep 26, 2016
  • Research proposes background noise to prevent side channel attacks on computer keyboards, Voat, Sep 27, 2016
  • The next cyberattack could come from sound waves, The Conversation, March 27, 2017
  • The next cyberattack could come from sound waves, Yahoo! Tech, March 27, 2017
  • Sound waves being used to launch cyber attacks!, Cybersecurity Insiders, March 27, 2017
  • Commentary: The next cyberattack could come from sound waves, CHANNEL NEWSASIA, March 29, 2017
  • The next cyberattack could render your anti-virus and encryption software useless, Business Insider, March 27, 2017

 

Recent News

  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025
  • AI Spies News — BPSniff (IEEE S&P 2025) Paper News Story May 12, 2025
  • Launching the AI Spies News Channel May 12, 2025
  • Paper accepted to WiSec 2025 May 11, 2025
  • SPIES Lab’s Secure Messaging Work Features in News May 3, 2025
  • SPIES Lab Student to Start as an Assistant Professor April 18, 2025
  • Dr. Saxena’s Primer on Secure Communications in News Media March 31, 2025
  • Dr. Saxena recognized with the Dean’s Excellence Award! February 14, 2025
  • Dr. Saxena appointed as the Senior Area Editor, IEEE TIFS February 6, 2025
  • 2 Full Papers Accepted to WWW 2025 January 20, 2025
  • Journal paper accepted to IEEE TMC December 18, 2024
  • New post-doctoral researcher joins the lab December 11, 2024
  • Paper Accepted to ACM Computing Surveys 2024 November 30, 2024
  • Paper Accepted to IEEE S&P 2025 October 21, 2024
  • Paper Accepted to Nature Human Behaviour October 20, 2024
  • 2 new PhD students join the SPIES lab August 31, 2024
  • Post-Doc Position Available August 3, 2024
  • Paper accepted to ISC 2024 July 30, 2024
  • Paper Accepted to ACM CCS 2024 July 5, 2024

© 2016–2025 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment