Back to Search Start Over

PILOT: Password and PIN information leakage from obfuscated typing videos1.

Authors :
Balagani, Kiran
Cardaioli, Matteo
Conti, Mauro
Gasti, Paolo
Georgiev, Martin
Gurtler, Tristan
Lain, Daniele
Miller, Charissa
Molas, Kendall
Samarin, Nikita
Saraci, Eugen
Tsudik, Gene
Wu, Lynn
Source :
Journal of Computer Security; 2019, Vol. 27 Issue 4, p405-425, 21p
Publication Year :
2019

Abstract

This paper studies leakage of user passwords and PINs based on observations of typing feedback on screens or from projectors in the form of masked characters (∗ or ∙) that indicate keystrokes. To this end, we developed an attack called Password and Pin Information Leakage from Obfuscated Typing Videos (PILOT). Our attack extracts inter-keystroke timing information from videos of password masking characters displayed when users type their password on a computer, or their PIN at an ATM. We conducted several experiments in various attack scenarios. Results indicate that, while in some cases leakage is minor, it is quite substantial in others. By leveraging inter-keystroke timings, PILOT recovers 8-character alphanumeric passwords in as little as 19 attempts. When guessing PINs, PILOT significantly improved on both random guessing and the attack strategy adopted in our prior work (In European Symposium on Research in Computer Security (2018) 263–280 Springer). In particular, we were able to guess about 3% of the PINs within 10 attempts. This corresponds to a 26-fold improvement compared to random guessing. Our results strongly indicate that secure password masking GUIs must consider the information leakage identified in this paper. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
27
Issue :
4
Database :
Complementary Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
137596907
Full Text :
https://doi.org/10.3233/JCS-191289