Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
- 20 September 2014
- journal article
- Published by Springer Science and Business Media LLC in International Journal of Information Security
- Vol. 14 (5), 443-456
- https://doi.org/10.1007/s10207-014-0264-7
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel AttacksLecture Notes in Computer Science, 2013
- (sp)iPhonePublished by Association for Computing Machinery (ACM) ,2011
- The true cost of unusable password policiesPublished by Association for Computing Machinery (ACM) ,2010
- Keyboard acoustic emanations revisitedACM Transactions on Information and System Security, 2009
- ClearShot: Eavesdropping on Keyboard Input from Video2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
- Dictionary attacks using keyboard acoustic emanationsPublished by Association for Computing Machinery (ACM) ,2006
- Keyboard acoustic emanations revisitedPublished by Association for Computing Machinery (ACM) ,2005
- Keyboard acoustic emanationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Users are not the enemyCommunications of the ACM, 1999
- Password securityCommunications of the ACM, 1979