PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

03/30/2019
by   Kiran Balagani, et al.
0

This paper studies leakage of user passwords and PINs based on observations of typing feedback on screens or from projectors in the form of masked characters that indicate keystrokes. To this end, we developed an attack called Password and Pin Information Leakage from Obfuscated Typing Videos (PILOT). Our attack extracts inter-keystroke timing information from videos of password masking characters displayed when users type their password on a computer, or their PIN at an ATM. We conducted several experiments in various attack scenarios. Results indicate that, while in some cases leakage is minor, it is quite substantial in others. By leveraging inter-keystroke timings, PILOT recovers 8-character alphanumeric passwords in as little as 19 attempts. When guessing PINs, PILOT significantly improved on both random guessing and the attack strategy adopted in our prior work [4]. In particular, we were able to guess about 3 improvement compared to random guessing. Our results strongly indicate that secure password masking GUIs must consider the information leakage identified in this paper.

READ FULL TEXT

page 5

page 7

research
05/21/2019

Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage

Personal Identification Numbers (PIN) are widely used as authentication ...
research
01/12/2018

Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack

Transmitter-side channel state information (CSI) of the legitimate desti...
research
04/29/2019

Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating

Crowdsourcing human-solving or online typing attacks are destructive pro...
research
02/02/2023

An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation

This paper argues and shows that speculative vectorization, where a loop...
research
11/30/2018

Thinging Machine applied to Information Leakage

This paper introduces a case study that involves data leakage in a bank ...
research
11/25/2022

Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels

The complexity of modern processor architectures has given rise to sophi...
research
09/01/2018

What's a little leakage between friends?

This paper introduces a new attack on recent messaging systems that prot...

Please sign up or login with your details

Forgot password? Click here to reset