Keystroke inference attacks are a class of privacy-invasive technique that allows attackers to infer what a user is typing on a keyboard.[1][2][3][4][5][6][7][8]
^Sabra, Mohd; Maiti, Anindya; Jadliwala, Murtuza (2021). "Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks". NDSS Symposium. Internet Society. doi:10.14722/ndss.2021.23063. ISBN 978-1-891562-66-2.
^Chen, Yimin; Li, Tao; Zhang, Rui; Zhang, Yanchao; Hedgpeth, Terri (2018-05-01). "EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements". IEEE Symposium on Security and Privacy. IEEE: 144–160. doi:10.1109/SP.2018.00010. ISBN 978-1-5386-4353-2.
^Li, Mengyuan; Meng, Yan; Liu, Junyi; Zhu, Haojin; Liang, Xiaohui; Liu, Yao; Ruan, Na (2016-10-24). "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals". ACM CCS. ACM: 1068–1079. doi:10.1145/2976749.2978397. ISBN 978-1-4503-4139-4.
^Halevi, T.; Saxena, N. (2012-05-02). "A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques". ACM CCS. ACM: 89–90. doi:10.1145/2414456.2414509. ISBN 978-1-4503-1648-4.
^Marquardt, Philip; Verma, Arunabh; Carter, Henry; Traynor, Patrick (2011-10-17). "(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers". ACM CCS. ACM: 551–562. doi:10.1145/2046707.2046771. ISBN 978-1-4503-0948-6.
^Cai, Liang; Chen, Hao (2011). "{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartphone Motion". USENIX HotSec'11.
^Liu, Xiangyu; Zhou, Zhe; Diao, Wenrui; Li, Zhou; Zhang, Kehuan (2015-10-12). "When Good Becomes Evil: Keystroke Inference with Smartwatch". ACM CCS. ACM: 1273–1285. doi:10.1145/2810103.2813668. ISBN 978-1-4503-3832-5.
^Ali, Kamran; Liu, Alex X.; Wang, Wei; Shahzad, Muhammad (2015-09-07). "Keystroke Recognition Using WiFi Signals". ACM CCS. ACM: 90–102. doi:10.1145/2789168.2790109. ISBN 978-1-4503-3619-2.
and 8 Related for: Keystroke inference attack information
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically...
are active and online.) The botmaster may then use the bots to gather keystrokes or use form grabbing to steal online credentials and may rent out the...
Wagner, David A.; Tian, Xuqing (2001). "Timing Analysis of Keystrokes and Timing Attacks on SSH" (PDF). Tenth USENIX Security Symposium. Brands, S. (1994)...
hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent an attacker from maliciously...
73% (2 Aug), researchers report an unprecedented accuracy of reading keystrokes from audio of smartphone-recordings or video-chats (7 Aug), a global survey...
encoding for every aspect of text that could not be recorded by a single keystroke on the QWERTY keyboard, encoding was invented. Text Encoding Initiative...