{"id":13440,"date":"2023-08-09T10:04:42","date_gmt":"2023-08-09T10:04:42","guid":{"rendered":"http:\/\/TheNextWeb=1398913"},"modified":"2023-08-09T10:04:42","modified_gmt":"2023-08-09T10:04:42","slug":"deep-learning-model-can-steal-data-by-listening-to-keystrokes-with-95-accuracy","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=13440","title":{"rendered":"Deep learning model can steal data by listening to keystrokes with 95% accuracy"},"content":{"rendered":"\n<div><img decoding=\"async\" src=\"https:\/\/img-cdn.tnwcdn.com\/image\/tnw-blurple?filter_last=1&amp;fit=1280%2C640&amp;url=https%3A%2F%2Fcdn0.tnwcdn.com%2Fwp-content%2Fblogs.dir%2F1%2Ffiles%2F2023%2F08%2Fdeep-learning-hack-acoustic-attack-keystrokes.jpg&amp;signature=ee946d9e8ecd71d767055398707c6ddd\" class=\"ff-og-image-inserted\"><\/div>\n<p><span>A team of UK researchers has trained a <a href=\"https:\/\/thenextweb.com\/topic\/deep-learning\" target=\"_blank\" rel=\"noopener\">deep learning<\/a> model to interpret keystrokes remotely based solely on audio.<\/span><\/p>\n<p><span>By recording keystrokes to train the model, they were able to predict what was typed on the keyboard with up to 95% accuracy. This accuracy dropped to 93% when using Zoom to train the system.<\/span><\/p>\n<p><span>According to the new <\/span><a href=\"https:\/\/arxiv.org\/pdf\/2308.01074.pdf\" target=\"_blank\" rel=\"nofollow noopener\"><span>research<\/span><\/a><span>, this means that sensitive information like passwords and messages could be interpreted by anyone within hearshot of someone typing away on their laptop, either by recording them in person or virtually through a video call.&nbsp;<\/span><\/p>\n<p><span>These so-called acoustic side-channel attacks <\/span><span>have become much simpler in recent years due to the abundance of microphone-bearing devices like smartphones that can capture high-quality audio.&nbsp;<\/span><\/p>\n<p><span>Combined with the rapid advancements in machine learning, this makes these kinds of attacks feasible and a lot more dangerous than previously thought. Basically, you could <a href=\"https:\/\/thenextweb.com\/topic\/hack\" target=\"_blank\" rel=\"noopener\">hack<\/a> sensitive information armed with nothing more than a microphone and machine learning algorithm.<\/span><\/p>\n<div class=\"inarticle-wrapper channel-cta\">\n<div class=\"ica-text\" readability=\"0\"><a href=\"https:\/\/thenextweb.com\/events\/talks\" data-event-category=\"Article\" data-event-action=\"In Article Block\" data-event-label=\"Catch up on our conference talks\" target=\"_blank\" readability=\"4\" rel=\"noopener\"><\/p>\n<p class=\"ica-text__title\">Catch up on our conference talks<\/p>\n<p>Watch videos of our past talks for free with TNW All Access \u2192<\/p>\n<p><\/a><\/div>\n<\/div>\n<p><span>\u201cThe ubiquity of keyboard acoustic emanations makes them not only a readily available attack vector, but also prompts victims to underestimate (and therefore not try to hide) their output,\u201d the researchers said. \u201cFor example, when typing a password, people will regularly hide their screen but will do little to obfuscate their keyboard\u2019s sound.\u201d<\/span><\/p>\n<p><span>The team conducted the test using a MacBook Pro. They pressed 36 individual keys 25 times a piece. This was the basis for the machine learning model to recognise what character is associated with what keystroke sound.&nbsp;<\/span><\/p>\n<p><span>This information was recorded both via a phone in close physical proximity to the laptop and Zoom. <\/span><span>There were enough subtle differences in the waveforms produced by the recording for it to recognise each key with a startling degree of accuracy.<\/span><\/p>\n<p><span>To prevent someone hacking your keystrokes, the researchers recommend typing style changes, using randomised passwords as opposed to passwords containing full words, adding randomly generated fake keystrokes for voice call-based attacks, and <\/span><span>using biometric tools, like fingerprint or face scanning.<\/span><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/deep-learning-steal-data-ai-keystrokes\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A team of UK researchers has trained a deep learning model to interpret keystrokes remotely based solely on audio. By recording keystrokes to train the model, they were able to predict what&#8230;<\/p>\n","protected":false},"author":1,"featured_media":13441,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/13440"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13440"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/13440\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/13441"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}