TY - GEN
T1 - BrokenStrokes
T2 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2020
AU - Oligeri, Gabriele
AU - Sciancalepore, Savio
AU - Raponi, Simone
AU - Di Pietro, Roberto
N1 - Publisher Copyright:
© 2020 ACM.
PY - 2020/7/8
Y1 - 2020/7/8
N2 - Wireless devices resorting to event-triggered communications have been proved to suffer critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) emissions. In this paper, we move the attack frontier forward by proposing BrokenStrokes: an inexpensive, easy to implement, efficient, and effective attack able to detect the typing of a pre-defined keyword by only eavesdropping the communication channel used by the wireless keyboard. BrokenStrokes proves itself to be a particularly dreadful attack: it achieves its goal when the eavesdropping antenna is up to 15 meters from the target keyboard, regardless of the encryption scheme, the communication protocol, the presence of radio noise, and the presence of physical obstacles. While we detail the attack in three current scenarios and discuss its striking performance-its success probability exceeds 90%6 in normal operating conditions-, we also provide some suggestions on how to mitigate it. The data utilized in this paper have been released as open-source to allow practitioners, industries, and academia to verify our claims and use them as a basis for further developments.
AB - Wireless devices resorting to event-triggered communications have been proved to suffer critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) emissions. In this paper, we move the attack frontier forward by proposing BrokenStrokes: an inexpensive, easy to implement, efficient, and effective attack able to detect the typing of a pre-defined keyword by only eavesdropping the communication channel used by the wireless keyboard. BrokenStrokes proves itself to be a particularly dreadful attack: it achieves its goal when the eavesdropping antenna is up to 15 meters from the target keyboard, regardless of the encryption scheme, the communication protocol, the presence of radio noise, and the presence of physical obstacles. While we detail the attack in three current scenarios and discuss its striking performance-its success probability exceeds 90%6 in normal operating conditions-, we also provide some suggestions on how to mitigate it. The data utilized in this paper have been released as open-source to allow practitioners, industries, and academia to verify our claims and use them as a basis for further developments.
KW - cyber-physical systems security
KW - side-channel attacks
KW - wireless communications security
UR - http://www.scopus.com/inward/record.url?scp=85092009038&partnerID=8YFLogxK
U2 - 10.1145/3395351.3399351
DO - 10.1145/3395351.3399351
M3 - Conference contribution
AN - SCOPUS:85092009038
T3 - WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
SP - 231
EP - 241
BT - WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PB - Association for Computing Machinery
Y2 - 8 July 2020 through 10 July 2020
ER -