Electromagnetic radiation revisited
Computers and Security
Electromagnetic radiation from video display units: an eavesdropping risk?
Computers and Security
Multiple view geometry in computer visiond
Multiple view geometry in computer visiond
Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns
IEEE Transactions on Pattern Analysis and Machine Intelligence
A decision-theoretic generalization of on-line learning and an application to boosting
EuroCOLT '95 Proceedings of the Second European Conference on Computational Learning Theory
Optical Time-Domain Eavesdropping Risks of CRT Displays
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Robust Real-Time Face Detection
International Journal of Computer Vision
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
Speech and Language Processing (2nd Edition)
Speech and Language Processing (2nd Edition)
Compromising Reflections-or-How to Read LCD Monitors around the Corner
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
ClearShot: Eavesdropping on Keyboard Input from Video
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Semi-supervised On-Line Boosting for Robust Tracking
ECCV '08 Proceedings of the 10th European Conference on Computer Vision: Part I
A Comparative Analysis of RANSAC Techniques Leading to Adaptive Real-Time Random Sample Consensus
ECCV '08 Proceedings of the 10th European Conference on Computer Vision: Part II
Tempest in a Teapot: Compromising Reflections Revisited
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Keyboard acoustic emanations revisited
ACM Transactions on Information and System Security (TISSEC)
The Meteor metric for automatic evaluation of machine translation
Machine Translation
Compromising electromagnetic emanations of wired and wireless keyboards
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Learning object detection from a small number of examples: the importance of good features
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Forward-Backward Error: Automatic Detection of Tracking Failures
ICPR '10 Proceedings of the 2010 20th International Conference on Pattern Recognition
Electromagnetic eavesdropping risks of flat-panel displays
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Fingerprint attack against touch-enabled devices
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Know your enemy: the risk of unauthorized access in smartphones by insiders
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
A tap and gesture hybrid method for authenticating smartphone users
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Exploring the design space of graphical passwords on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
PIN skimmer: inferring PINs through the camera and microphone
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
We investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards. Specifi- cally, we show that so-called compromising reflections (in, for example, a victim's sunglasses) of a device's screen are sufficient to enable automated reconstruction, from video, of text typed on a virtual keyboard. Despite our deliberate use of low cost commodity video cameras, we are able to compensate for variables such as arbitrary camera and device positioning and motion through the application of advanced computer vision and machine learning techniques. Using footage captured in realistic environments (e.g., on a bus), we show that we are able to reconstruct fluent translations of recorded data in almost all of the test cases, correcting users' typing mistakes at the same time. We believe these results highlight the importance of adjusting privacy expectations in response to emerging technologies.