scholarly journals Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds

Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3015 ◽  
Author(s):  
Sourav Panda ◽  
Yuanzhen Liu ◽  
Gerhard Petrus Hancke ◽  
Umair Mujtaba Qureshi

This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are commonly used by personnel in different industrial and consumer electronic applications, such as entry at security checkpoints, ATMs and customer kiosks, etc. In this paper, we propose a side-channel attack on a 4–6 digit random PIN key, and a PIN key user verification method. The intervals between two keystrokes are extracted from the acoustic emanation and used as features to train machine-learning models. The attack model has a 60% chance to recover the PIN key. The verification model has an 88% accuracy on identifying the user. Our attack methods can perform key recovery by using the acoustic side-channel at low cost. As a countermeasure, our verification method can improve the security of PIN entry devices.

Author(s):  
Heiko Lohrke ◽  
Shahin Tajik ◽  
Thilo Krachenfels ◽  
Christian Boit ◽  
Jean-Pierre Seifert

Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few proof-of-concept experiments based on TLS or similar approaches have been reported in the literature, which do not reflect a real attack scenario. Therefore, it is still questionable whether this attack technique is applicable to modern ICs equipped with side-channel countermeasures. The primary aim of this work is to assess the feasibility of launching a TLS attack against a device with robust security features. To this end, we select a modern FPGA, and more specifically, its key memory, the so-called battery-backed SRAM (BBRAM), as a target. We demonstrate that an attacker is able to extract the stored 256-bit AES key used for the decryption of the FPGA’s bitstream, by conducting just a single non-invasive measurement. Moreover, it becomes evident that conventional countermeasures are incapable of preventing our attack since the FPGA is turned off during key recovery. Based on our time measurements, the required effort to develop the attack is shown to be less than 7 hours. To avert this powerful attack, we propose a low-cost and CMOS compatible countermeasure circuit, which is capable of protecting the BBRAM from TLS attempts even when the FPGA is powered off. Using a proof-of-concept prototype of our countermeasure, we demonstrate its effectiveness against TLS key extraction attempts.


Author(s):  
Yessy Yusnita

Abstrak.  Penelitian ini bertujuan membuat algoritma dan pemrograman form Kartu Hasil Studi yang disesuaikan dengan format form Universitas Andalas. Program atau algoritma untuk pembuatan form dibuat dengan menggunakan Microsoft Visual Basic 6.0. Data yang diinput adalah nama mahasiswa, universitas, semester, nomor buku pokok mahasiswa, fakultas, tahun, kode mata kuliah, satuan kredit semester, nilai, bobot, indeks prestasi kumulatif, bobot kumulatif, satuan kredit semester kumulatif, maksimal satuan kredit semester boleh diambil, jumlah satuan kredit semester, jumlah bobot, tanggal, nama dosen, nomor induk pegawai dosen yang sesuai dengan form Kartu Hasil Studi mahasiswa jurusan matematika Universitas Andalas. Dalam pembuatan algoritma form Kartu Hasil Studi tersebut, dibatasi pada data mahasiswa reguler 2014 dan data dosen jurusan matematika Universitas Andalas. Pada form dibuat menu utama seperti Pengolahan Data, Tampilan dan Programmer. Pada form ini tersedia beberapa menu pilihan yang berisi tentang menu proses berfungsi untuk mengisi data mahasiwa dan data dosen secara otomatis; menu hapus berfungsi untuk menghapus data-data yang telah kita input; menu print berfungsi untuk mencetak hasil dari data-data yang telah di input. Menu keluar berfungsi untuk keluar dari form.Kata Kunci: Algoritma dan Pemrograman, Micrososft Visual Basic 6.0, form Kartu Hasil Studi Abstract. This study aims to create algorithms and programming Study Result Card form adapted to the form format Andalas University. Program or algorithm to produce form created using Microsoft Visual Basic 6.0. Inputted data is the name of the student, university, semester, the number of books the subject of students, faculty, year, course code, semester credit units, value, weight, grade point average, weighted cumulative, semester credit units cumulative, maximum semester credit units may be loaded, the number of semester credit units, the amount of weight, date, name of the lecturer, lecturer personal identification number that corresponds to the form Card Study Results students majoring in mathematics Andalas University. In the manufacture of algorithms form the Study Result Card, limited to data the regular student 2014 and data lecturer of majoring in mathematics Andalas University. On the main menu form is created as Data Processing, Display and Programmer. In this form is available several menu options on the menu that contains the process serves to fill the data students and faculty the data automatically; menu delete function to delete the data that we have input; menu print function to print the results of the data that has been input. Menu exit serves to get out of the formKeywords: Algorithm and Program, Microsoft Visual Basic 6.0, form the card results of the study


2021 ◽  
pp. C1-C1
Author(s):  
Meziane Hamoudi ◽  
Amina Bel Korchi ◽  
Sylvain Guilley ◽  
Sofiane Takarabt ◽  
Khaled Karray ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document