Attacking random keypads through click timing analysis

Charles Fleming*, Ning Cui, Dawei Liu, Haining Liang

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

3 Citations (Scopus)

Abstract

This paper introduces a new method for attacking Personal Identification Numbers (PINs) through analysis of time delay between clicks. While click timing attacks are not new, they previously relied on known spacings between keys. In our method, we do not focus on flaws or weaknesses in the system itself, but on the flaws inherent in the human aspect of the system. Our attack exploits unconscious patterns in PIN input that are a side-effect of the human memorization process to narrow the PIN down to a specific class, such as date, greatly reducing the possible set of pass codes. To identify these patterns, we use a series of Support Vector Machines (SVM) as a multi-class classifier. Through analysis of our collected data set we demonstrate that this attack is very effective.

Original languageEnglish
Title of host publicationProceedings - 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages118-121
Number of pages4
ISBN (Electronic)9781479962358
DOIs
Publication statusPublished - 12 Dec 2014
Event6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014 - Shanghai, China
Duration: 10 Oct 201412 Oct 2014

Publication series

NameProceedings - 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014

Conference

Conference6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014
Country/TerritoryChina
CityShanghai
Period10/10/1412/10/14

Keywords

  • PIN
  • Personal Identification Numbers
  • security
  • timing attack

Cite this