Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

10/22/2020
by   Mohd Sabra, et al.
1

Due to recent world events, video calls have become the new norm for both personal and professional remote communication. However, if a participant in a video call is not careful, he/she can reveal his/her private information to others in the call. In this paper, we design and evaluate an attack framework to infer one type of such private information from the video stream of a call – keystrokes, i.e., text typed during the call. We evaluate our video-based keystroke inference framework using different experimental settings and parameters, including different webcams, video resolutions, keyboards, clothing, and backgrounds. Our relatively high keystroke inference accuracies under commonly occurring and realistic settings highlight the need for awareness and countermeasures against such attacks. Consequently, we also propose and evaluate effective mitigation techniques that can automatically protect users when they type during a video call.

READ FULL TEXT

page 6

page 13

page 15

page 16

page 18

research
08/23/2018

Light Ears: Information Leakage via Smart Lights

Modern Internet-enabled smart lights promise energy efficiency and many ...
research
04/14/2021

Phishing Mitigation Techniques: A Literature Survey

Email is a channel of communication which is considered to be a confiden...
research
10/21/2022

Detection of Real-time DeepFakes in Video Conferencing with Active Probing and Corneal Reflection

The COVID pandemic has led to the wide adoption of online video calls in...
research
10/27/2020

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Transfer learning is a useful machine learning framework that allows one...
research
05/08/2022

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

Personal video conferencing has become the new norm after COVID-19 cause...
research
01/03/2023

Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition

Deep neural networks (DNNs) are vulnerable to a class of attacks called ...
research
02/09/2023

SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

In this paper, we revisit the use of honeypots for detecting reflective ...

Please sign up or login with your details

Forgot password? Click here to reset