1. | MO Spata; VM Russo; A Ortis; S Battiato: A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm. In: IEEE Access, 13 , pp. 24498 - 24514, 2025. (Type: Journal Article | Abstract | Links | BibTeX) @article{Spata2025, title = {A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm}, author = {MO Spata and VM Russo and A Ortis and S Battiato}, editor = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/10858134}, doi = {10.1109/ACCESS.2025.3536877}, year = {2025}, date = {2025-01-29}, journal = {IEEE Access}, volume = {13}, pages = {24498 - 24514}, abstract = {This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, while key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results show a peak accuracy of 98.3%.}, keywords = {}, pubstate = {published}, tppubtype = {article} } This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, while key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results show a peak accuracy of 98.3%. |
2. | Massimo Orazio Spata, , Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato: A New Deep Learning Pipeline for Acoustic Attack on Keyboards. 1065 , 2024, ISBN: 978-3-031-66328-4. (Type: Proceeding | Abstract | Links | BibTeX) @proceedings{Spata2024b, title = {A New Deep Learning Pipeline for Acoustic Attack on Keyboards}, author = {Massimo Orazio Spata, , Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato}, editor = {Springer}, url = {https://link.springer.com/chapter/10.1007/978-3-031-66329-1_26#citeas}, doi = {https://doi.org/10.1007/978-3-031-66329-1_26}, isbn = {978-3-031-66328-4}, year = {2024}, date = {2024-07-31}, booktitle = {Lecture Notes in Networks and Systems ((LNNS,volume 1065))}, volume = {1065}, pages = {402-414}, abstract = {The increasing reliance on services based on recent Artificial Intelligence advancements has elevated concerns about security vulnerabilities, leading to the exploration of novel attack vectors such as keystroke acoustic attacks on keyboards. This research delves into a deep learning approach for such attacks, which exploits acoustic emissions produced during typing to infer sensitive information. Traditional methods of keystroke acoustic attacks have relied on hand-engineered features and shallow classifiers, often failing to capture the intricate patterns within the acoustic data. In contrast, deep learning models have demonstrated remarkable capabilities in learning intricate patterns from complex data sources. We propose the exploitation of a Temporal Convolutional Network (TCN) to process acoustic signals, providing a more sophisticated and adaptive approach for keystroke acoustic attack analysis. The employed deep learning model showcases superior performance in multiple dimensions achieving a peak validation accuracy of 98.3% for keystrokes recorded by phone, and 93.05% for keystrokes recorded via Zoom, obtaining the best performances with respect the related prior art.}, keywords = {}, pubstate = {published}, tppubtype = {proceedings} } The increasing reliance on services based on recent Artificial Intelligence advancements has elevated concerns about security vulnerabilities, leading to the exploration of novel attack vectors such as keystroke acoustic attacks on keyboards. This research delves into a deep learning approach for such attacks, which exploits acoustic emissions produced during typing to infer sensitive information. Traditional methods of keystroke acoustic attacks have relied on hand-engineered features and shallow classifiers, often failing to capture the intricate patterns within the acoustic data. In contrast, deep learning models have demonstrated remarkable capabilities in learning intricate patterns from complex data sources. We propose the exploitation of a Temporal Convolutional Network (TCN) to process acoustic signals, providing a more sophisticated and adaptive approach for keystroke acoustic attack analysis. The employed deep learning model showcases superior performance in multiple dimensions achieving a peak validation accuracy of 98.3% for keystrokes recorded by phone, and 93.05% for keystrokes recorded via Zoom, obtaining the best performances with respect the related prior art. |
2025 |
MO Spata; VM Russo; A Ortis; S Battiato A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm Journal Article IEEE Access, 13 , pp. 24498 - 24514, 2025. Abstract | Links | BibTeX | Tags: Acoustic side channel attack, Deep learning, laptop keystroke attacks, snooping keystroke attacks, user security and privacy, zoom-based acoustic attacks @article{Spata2025, title = {A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm}, author = {MO Spata and VM Russo and A Ortis and S Battiato}, editor = {IEEE}, url = {https://ieeexplore.ieee.org/abstract/document/10858134}, doi = {10.1109/ACCESS.2025.3536877}, year = {2025}, date = {2025-01-29}, journal = {IEEE Access}, volume = {13}, pages = {24498 - 24514}, abstract = {This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, while key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results show a peak accuracy of 98.3%.}, keywords = {Acoustic side channel attack, Deep learning, laptop keystroke attacks, snooping keystroke attacks, user security and privacy, zoom-based acoustic attacks}, pubstate = {published}, tppubtype = {article} } This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To address this issue, mathematical wavelet transforms have been tested, while key recognition has been implemented using the inference test of a deep learning model based on a Temporal Convolutional Network (TCN). The novelty of the proposed pipeline lies in its dynamic audio analysis and keystroke recognition, which splits the wave based on audio signal peaks generated by key presses. This approach enables an attack in real-world conditions without knowing the exact number of keystrokes typed by the user. Experimental results show a peak accuracy of 98.3%. |
2024 |
Massimo Orazio Spata, , Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato A New Deep Learning Pipeline for Acoustic Attack on Keyboards Proceeding 1065 , 2024, ISBN: 978-3-031-66328-4. Abstract | Links | BibTeX | Tags: Acoustic side channel attack, Deep learning, laptop keystroke attacks, user security and privacy, zoom-based acoustic attacks @proceedings{Spata2024b, title = {A New Deep Learning Pipeline for Acoustic Attack on Keyboards}, author = {Massimo Orazio Spata, , Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato}, editor = {Springer}, url = {https://link.springer.com/chapter/10.1007/978-3-031-66329-1_26#citeas}, doi = {https://doi.org/10.1007/978-3-031-66329-1_26}, isbn = {978-3-031-66328-4}, year = {2024}, date = {2024-07-31}, booktitle = {Lecture Notes in Networks and Systems ((LNNS,volume 1065))}, volume = {1065}, pages = {402-414}, abstract = {The increasing reliance on services based on recent Artificial Intelligence advancements has elevated concerns about security vulnerabilities, leading to the exploration of novel attack vectors such as keystroke acoustic attacks on keyboards. This research delves into a deep learning approach for such attacks, which exploits acoustic emissions produced during typing to infer sensitive information. Traditional methods of keystroke acoustic attacks have relied on hand-engineered features and shallow classifiers, often failing to capture the intricate patterns within the acoustic data. In contrast, deep learning models have demonstrated remarkable capabilities in learning intricate patterns from complex data sources. We propose the exploitation of a Temporal Convolutional Network (TCN) to process acoustic signals, providing a more sophisticated and adaptive approach for keystroke acoustic attack analysis. The employed deep learning model showcases superior performance in multiple dimensions achieving a peak validation accuracy of 98.3% for keystrokes recorded by phone, and 93.05% for keystrokes recorded via Zoom, obtaining the best performances with respect the related prior art.}, keywords = {Acoustic side channel attack, Deep learning, laptop keystroke attacks, user security and privacy, zoom-based acoustic attacks}, pubstate = {published}, tppubtype = {proceedings} } The increasing reliance on services based on recent Artificial Intelligence advancements has elevated concerns about security vulnerabilities, leading to the exploration of novel attack vectors such as keystroke acoustic attacks on keyboards. This research delves into a deep learning approach for such attacks, which exploits acoustic emissions produced during typing to infer sensitive information. Traditional methods of keystroke acoustic attacks have relied on hand-engineered features and shallow classifiers, often failing to capture the intricate patterns within the acoustic data. In contrast, deep learning models have demonstrated remarkable capabilities in learning intricate patterns from complex data sources. We propose the exploitation of a Temporal Convolutional Network (TCN) to process acoustic signals, providing a more sophisticated and adaptive approach for keystroke acoustic attack analysis. The employed deep learning model showcases superior performance in multiple dimensions achieving a peak validation accuracy of 98.3% for keystrokes recorded by phone, and 93.05% for keystrokes recorded via Zoom, obtaining the best performances with respect the related prior art. |