At the same time, it is well known that the security of a system is based on its weakest link. Furthermore, it is often
assumed that the involvement of a fallible (or simply gullible) human user corresponds to this weakest link, e.g., as in
Shoulder-Surfing and Lunch-Time attacks [
4
]. However, other insider attacks that focus on stealing passwords by
compromising the user environment, e.g., Acoustic Emanations [
5
,
6
,
7
] or Keyboard Vibrations [
8
], show that the
weakest link is a consequence of certain laws of Physics in the form of side-channels.
Although side-channels can be effective (with optimal environmental conditions, equipment and time), information
gleaned from them are usually incomplete, thus still leaving the attacker with a sizeable password search space. One
intuitive way to reduce the attacker’s search space is to combine multiple side-channels.
In this paper, we introduce Thermanator, a novel thermal residue side-channel attack on passwords entered on external
keyboards, and evaluate its efficacy. We then supplement the thermal side-channel with its audio counterpart (via
keyboard acoustic emanations) to yield
AcuTherm
, the first hybrid side-channel attack. Sections 1.1 and 1.2, overview
these two side-channels.
1.1 Heat Transfer & Thermal Emanations
Any time two objects with unequal temperatures come in contact with each other, an exchange of heat occurs. This
is unavoidable. Being warm-blooded, human beings naturally prefer environments that are colder than their internal
temperature. Because of this heat disparity, it is inevitable that we leave thermal residue on numerous objects that we
routinely touch, especially, with bare fingers. Furthermore, it takes time for these heated objects to cool off and lose
heat energy imparted by human contact. It is both not surprising and worrisome that this includes our interactions with
keyboards that are used for entering sensitive private information, such as passwords.
Based on this observation, we consider a mostly unexplored attack space where heat transfer and subsequent thermal
residue can be exploited by a clever adversary to steal passwords from a keyboard some time after it was used for
password entry. The main distinctive benefit of this attack type is that adversary’s real time presence is not required.
Instead, a successful attack can occur with after-the-fact adversarial presence: as our results show, many seconds later.
While there has been some prior work on using thermal emanations to crack PINs, mobile phone screen-locks and
opening combinations of vaults/safes [
9
,
10
,
11
,
12
], this work represents the first comprehensive investigation of
human-based thermal residues and emanations of external computer keyboards.
1.2 Keyboard Acoustics
Acoustic side-channel attacks rely on unique sounds produced during the processing of a secret to gather information.
Previous work includes recovering various types of secrets, such as printed texts [
13
], 3D-printed objects [
14
] and
cryptographic keys [15].
Generally, acoustic side-channel attacks against password entry are based on the sounds produced by pressed keys on a
keyboard. These sounds were shown to be distinct [
5
], allowing an attacker to differentiate among pressed keys and
thus recover passwords, even in a remote VoIP setting [
7
]. In addition, inter-keystroke timings can be used to reduce
password search space [16, 17] via various statistical techniques to determine likely candidate key-pairs. If dictionary
passwords are used, methods similar to those in [
6
] can be used due to the underlying base language properties. For
random passwords, dictionaries are not applicable, since they lack the structure that can be used to reduce password
search space. [
18
] investigates this phenomenon and suggests a brute-force password search mechanism based on 5
best-guesses for each key in the password, similar to the one in [7].
Unfortunately, acoustic side-channels often involve a lengthy training phase (i.e., profiling) of victim’s typing style
and provide incomplete information on the target secret, e.g., inter-keystroke timings can be same for many different
key-pairs. Moreover, extrapolating information obtained from individual key-pairs to passwords presents a challenge
that was only investigated with ad-hoc methods [18, 7].
1.3 Expected Contributions
In this paper, we propose and evaluate a new human-based side-channel attack class, Thermanator, based on thermal
residue left behind by a user (victim) who enters a password using a typical external keyboard. Shortly after password
entry, the victim either steps away inadvertently, or is drawn away (perhaps as a result of being prompted by the
adversary) from their personal workplace. Then, the adversary captures thermal images of the victim keyboard. We
examine the efficacy of Thermanator Attacks for a moderately sophisticated adversary equipped with a mid-range
thermal imaging camera.
2