A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To a...
Saved in:
Main Authors: | Massimo Orazio Spata, Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10858134/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
High-roubustness keystroke recognition method based on acoustic spatial gradient
by: Ying LIU, et al.
Published: (2020-05-01) -
Template attack of Crypto chip based on clustering
by: Zhen WU, et al.
Published: (2018-08-01) -
Keystroke features recognition based on stable linear discriminant analysis
by: Wei-guo SHEN, et al.
Published: (2017-11-01) -
Review of side-channel privacy inference of Android mobile devices
by: Futian SHI, et al.
Published: (2018-04-01) -
Blind mask template attacks on masked cryptographic algorithm
by: Yi WANG, et al.
Published: (2019-01-01)