In 2004, Dmitri Asonov and Rakesh Agrawal of the
IBM Almaden Research Center announced that
computer keyboards and keypads used on
telephones and
automated teller machines (ATMs) are vulnerable to attacks based on the sounds produced by different keys. Their attack employed a
neural network to recognize the key being pressed. By analyzing recorded sounds, they were able to recover the text of data being entered. These techniques allow an attacker using
covert listening devices to obtain
passwords,
passphrases,
personal identification numbers (PINs), and other information entered via keyboards. In 2005, a group of UC Berkeley researchers performed a number of practical experiments demonstrating the validity of this kind of threat. Also in 2004,
Adi Shamir and
Eran Tromer demonstrated that it may be possible to conduct
timing attacks against a
CPU performing cryptographic operations by analyzing variations in acoustic emissions. Analyzed emissions were
ultrasonic noise emanating from
capacitors and
inductors on computer
motherboards, not
electromagnetic emissions or the human-audible humming of a cooling fan. Shamir and Tromer, along with new collaborator Daniel Genkin and others, then went on to successfully implement the attack on a laptop running a version of
GnuPG (an
RSA implementation), using either a mobile phone located close to the laptop, or a laboratory-grade microphone located up to 4 m away, and published their experimental results in December 2013. Acoustic emissions occur in coils and capacitors because of small movements when a current surge passes through them. Capacitors in particular change diameter slightly as their many layers experience electrostatic attraction/repulsion or piezoelectric size change. A coil or capacitor which emits acoustic noise will, conversely, also be microphonic, and the high-end audio industry takes steps with coils and capacitors to reduce these microphonics (immissions) because they can muddy a hi-fi amplifier's sound. In March 2015, it was made public that some inkjet printers using ultrasonic heads can be read back using high frequency
MEMS microphones to record the unique acoustic signals from each nozzle and using timing reconstruction with known printed data, that is, "confidential" in 12-point font. Thermal printers can also be read using similar methods but with less fidelity as the signals from the bursting bubbles are weaker. The hack also involved implanting a microphone, chip storage IC and burst transmitter with long-life Li+ battery into doctored cartridges substituted for genuine ones sent by post to the target, typically a bank, then retrieved from the garbage using challenge-response
RFID chip. A similar work on reconstructing printouts made by
dot-matrix printers was publicized in 2011. A new acoustic cryptanalysis technique discovered by a research team at Israel's
Ben-Gurion University Cybersecurity Research Center allows data to be extracted using a computer's speakers and headphones.
Forbes published a report stating that researchers found a way to see information being displayed, by using microphone, with 96.5% accuracy. In 2016, Genkin, Shamir, and Tromer published another paper that described a key extraction attack that relied on the acoustic emissions from laptop devices during the decryption process. They demonstrated the success of their attack with both a simple mobile phone and a more sensitive microphone. == Countermeasures ==