Computer Keyboard Hacking

Oct 22, 2008 by John Messina weblog
Computer kyboard (Wired)

(PhysOrg.com) -- Swiss researchers from the Security and Cryptography Laboratory have demonstrated different ways of eavesdropping on wired keyboards from at least 11 different models. The keyboards range from the latest ones to the ones used in 2001. Test show that all these keyboards were vulnerable to at least four of their attacks.

The researchers found that most modern keyboards generate electromagnetic emanations that can be used to decipher the keystrokes remotely. They used some basic instruments to "sniff" these electromagnetic emissions, which eventually helped them to decipher the keystrokes typed.

By using a wireless aerial, keystrokes were sniffed from a computer located a meter away. Once the data is sniffed, it is converted into decipherable text with software developed by Vuagnoux.

Another test revealed that keystrokes, from a computer in an adjacent room 20 to 30 feet away, could be deciphered by using a larger antenna.

It has been conclude that wired computer keyboards, sold in stores, generate compromising emanations that make it not safe to transmit sensitive information.

Electromagnetic eavesdropping dates back to as early as the mid 1980s, if not earlier. But Researchers say many of today´s keyboards have been adapted to prevent those attacks from working. Current research now shows that even these keyboards are vulnerable to electromagnetic sniffing.

It can be seen that such attacks would be limited due to electromagnetic interference from other electrical devices. The other thing that makes the attack unfeasible is the amount of sophisticated equipment required. Given all the fuss and expense, why not just use a more conventional method.

Compromising Electromagnetic Emanations of Keyboards Experiment 1/2

Compromising Electromagnetic Emanations of Keyboards Experiment 2/2

Related links:
lasecwww.epfl.ch/keyboard/
www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

Explore further: Newest computer neural networks can identify visual objects as well as the primate brain

add to favorites email to friend print save as pdf

Related Stories

New ZEBRA bracelet strengthens computer security

Sep 22, 2014

In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users ...

DIY glove-based tutor indicates muscle-memory potential

Aug 31, 2014

A senior editor at IEEE Spectrum worked on a DIY project that enabled his 11-year-old son to improve his touch typing by use of a vibrating glove. His son was already "pretty quick on the keyboard," said ...

G19 keyboard goes way beyond typing

Mar 25, 2009

It seems like the ordinary is no longer acceptable when it comes to the ordinary things we attach to our computers these days. For example, I'll bet the computer mouse you are using is at the very least an ...

Google Glass may run with laser-projected keyboard

Jan 18, 2013

(Phys.org)—Just when you thought you could swing into 2013 without another report on Google Glass in-the-wings, this is the week your luck runs out. Ideas continue to fly regarding what could possibly be ...

Recommended for you

Cloud computing helps make sense of cloud forests

Dec 17, 2014

The forests that surround Campos do Jordao are among the foggiest places on Earth. With a canopy shrouded in mist much of time, these are the renowned cloud forests of the Brazilian state of São Paulo. It is here that researchers ...

Teaching robots to see

Dec 15, 2014

Syed Saud Naqvi, a PhD student from Pakistan, is working on an algorithm to help computer programmes and robots to view static images in a way that is closer to how humans see.

User comments : 7

Adjust slider to filter visible comments by rank

Display comments: newest first

Falcon
5 / 5 (4) Oct 22, 2008
and not a mention of WIRELESS keyboards, their signals can probably be copied right out of the air...
Lord_jag
5 / 5 (2) Oct 22, 2008
Yep! It certianly can. And the signals are really quite easy to detect and decipher.

It's not inteded to be a security device, it's intended to be a convenience device.

The only security it has is the extremely low power transmitter only goes a few feet unless you get a really good antenna.
ShadowRam
4.7 / 5 (3) Oct 22, 2008
Yup, Look up "Blue Tooth Sniper Rifle"

Reading Wireless Keyboards is REAL easy.
thales
4 / 5 (2) Oct 22, 2008
Kinda like Van Eck Phreaking.
jeffsaunders
2 / 5 (2) Oct 22, 2008
Did Mission impossible do this a few years ago?

Probably standard equipment in spy schools.

Not the sort of thing Joe Geek will be able to do without University funding.
Falcon
3.3 / 5 (3) Oct 23, 2008
( accidental post)
Zig158
not rated yet Oct 25, 2008
Jeff I disagree, check out http://www.wartyping.com/
to see what I mean.
I don't see why you could not use a wifi sniffer program to capture the data and then just brute force the encryption.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.