{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:30:33Z","timestamp":1774801833700,"version":"3.50.1"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"],"award-info":[{"award-number":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"],"award-info":[{"award-number":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"],"award-info":[{"award-number":["EIA-01225989IIS-0205647CNS-0325247CCS-0424422"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2009,10]]},"abstract":"<jats:p>We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard and recovering up to 96% of typed characters. There is no need for training recordings labeled with the corresponding clear text. A recognizer bootstrapped from a 10-minute sound recording can even recognize random text such as passwords: In our experiments, 90% of 5-character random passwords using only letters can be generated in fewer than 20 attempts by an adversary; 80% of 10-character passwords can be generated in fewer than 75 attempts by an adversary. In the attack, we use the statistical constraints of the underlying content, English language, to reconstruct text from sound recordings without knowing the corresponding clear text. The attack incorporates a combination of standard machine learning and speech recognition techniques, including cepstrum features, Hidden Markov Models, linear classification, and feedback-based incremental learning.<\/jats:p>","DOI":"10.1145\/1609956.1609959","type":"journal-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:28:31Z","timestamp":1257359311000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":164,"title":["Keyboard acoustic emanations revisited"],"prefix":"10.1145","volume":"13","author":[{"given":"Li","family":"Zhuang","sequence":"first","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Feng","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2009,11,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE","author":"Asonov D."},{"key":"e_1_2_1_2_1","unstructured":"Atkinson K. 2005a. GNU Aspell. http:\/\/aspell.sourceforge.net.  Atkinson K. 2005a. GNU Aspell. http:\/\/aspell.sourceforge.net."},{"key":"e_1_2_1_3_1","unstructured":"Atkinson K. 2005b. Spell checker oriented word lists. http:\/\/wordlist.sourceforge.net.  Atkinson K. 2005b. Spell checker oriented word lists. http:\/\/wordlist.sourceforge.net."},{"key":"e_1_2_1_4_1","unstructured":"Bar-El H. 2003. Introduction to side channel attacks. http:\/\/www.hbarel.com\/Misc\/side_channel_attacks.html.  Bar-El H. 2003. Introduction to side channel attacks. http:\/\/www.hbarel.com\/Misc\/side_channel_attacks.html."},{"key":"e_1_2_1_5_1","unstructured":"Bilmes J. A. 1997. A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and Hidden Markov Models. Tech. rep. ICSI-TR-97-021 International Computer Science Institute Berkeley CA. ftp:\/\/ftp.icsi.berkeley.edu\/pub\/techreports\/1997\/tr-97-021.pdf.  Bilmes J. A. 1997. A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and Hidden Markov Models. Tech. rep. ICSI-TR-97-021 International Computer Science Institute Berkeley CA. ftp:\/\/ftp.icsi.berkeley.edu\/pub\/techreports\/1997\/tr-97-021.pdf."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Symposium on Electromagnetic Security for Information Protection. ACM","author":"Briol R.","year":"1991"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1977.10747"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007469218079"},{"key":"e_1_2_1_9_1","unstructured":"Jordan M. I. 2005. An Introduction to Probabilistic Graphical Models. In preparation.  Jordan M. I. 2005. An Introduction to Probabilistic Graphical Models. In preparation."},{"key":"e_1_2_1_10_1","unstructured":"Jurafsky D. and Martin J. H. 2000. Speech and Language Processing: An Introduction to Natural Language Processing Computational Linguistics and Speech Recognition. Prentice Hall Upper Saddle River NJ.   Jurafsky D. and Martin J. H. 2000. Speech and Language Processing: An Introduction to Natural Language Processing Computational Linguistics and Speech Recognition. Prentice Hall Upper Saddle River NJ."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830537"},{"key":"e_1_2_1_12_1","unstructured":"Kuhn M. G. 2003. Compromising emanations: Eavesdropping risks of computer displays. Tech. rep. UCAM-CL-TR-577 Computer Laboratory University of Cambridge UK. http:\/\/www.usenix.org\/events\/sec09\/tech\/full_papers\/sec09_attacks.pdf.  Kuhn M. G. 2003. Compromising emanations: Eavesdropping risks of computer displays. Tech. rep. UCAM-CL-TR-577 Computer Laboratory University of Cambridge UK. http:\/\/www.usenix.org\/events\/sec09\/tech\/full_papers\/sec09_attacks.pdf."},{"key":"e_1_2_1_13_1","first-page":"4","article-title":"An introduction to Hidden Markov Models","volume":"3","author":"Rabiner L. R.","year":"1986","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"e_1_2_1_14_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S.","year":"2003","edition":"2"},{"key":"e_1_2_1_15_1","unstructured":"Shamir A. and Tromer E. 2004. Acoustic cryptanalysis. http:\/\/www.wisdom.weizmann.ac.il\/~tromer\/acoustic.  Shamir A. and Tromer E. 2004. Acoustic cryptanalysis. http:\/\/www.wisdom.weizmann.ac.il\/~tromer\/acoustic."},{"key":"e_1_2_1_16_1","volume-title":"Proceeding of the 10th USENIX Security Symposium. USENIX Association","author":"Song D."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3115\/1034678.1034712"},{"key":"e_1_2_1_18_1","unstructured":"Wasserman P. D. 1993. Advanced Methods in Neural Computing. Wiley New York.   Wasserman P. D. 1993. Advanced Methods in Neural Computing. Wiley New York."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1609956.1609959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:14Z","timestamp":1750278374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["10.1145\/1609956.1609959"],"URL":"https:\/\/doi.org\/10.1145\/1609956.1609959","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10]]},"assertion":[{"value":"2006-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}