AI’s Ability to Decode Passwords Through Keystroke Sounds Raises Concerns

Reading Time: ( Word Count: )

August 17, 2023
Nextdoorsec-course

A recent study has unveiled a concerning discovery: AI systems can “hear” and identify keystrokes with a staggering 95% accuracy, opening the door for potential misuse by hackers to decipher passwords.

UK-based tech experts utilized a standard 2021 MacBook Pro laptop for their experiment. Their findings, which were disclosed in a publication from Cornell University, revealed that when an AI model was activated on a nearby iPhone, it astonishingly replicated the entered password based on the sound of the keystrokes.

Additionally, the AI’s accuracy remained high even when it was analyzing typing sounds captured by a laptop microphone during a Zoom call, achieving a 93% success rate – an unprecedented figure for such a setting.

Also Read: LinkedIn’s Support in Question as Account Breaches Surge

The study highlights the potential of what they termed “acoustic side channel attacks.” A significant concern is that users might not be adequately aware of this threat. As the researchers noted, “The common nature of keyboard sound emissions means they’re not only an accessible route for attackers, but also a risk often overlooked by users.”

The experiment involved typing on 36 distinct keys on the laptop 25 times, each with varying pressure and using different fingers. This allowed the AI to detect distinct sound patterns of each key. The setup included placing an iPhone 13 mini 17 centimeters away from the typing area.

This groundbreaking work was led by Joshua Harrison from Durham University, Ehsan Toreini from the University of Surrey, and Maryam Mehrnezhad from the Royal Holloway University of London.

This discovery sheds light on another potential pitfall of AI advancements. Esteemed voices in the industry, including OpenAI’s Sam Altman and business magnate Elon Musk, have previously stressed the imperative for caution with AI. Without the right precautions, the technology’s potential dangers to society might be vast.

Saher Mahmood

Saher Mahmood

Author

Saher is a cybersecurity researcher with a passion for innovative technology and AI. She explores the intersection of AI and cybersecurity to stay ahead of evolving threats.

Other interesting articles

Automated vs Manual Penetration Testing

Automated vs Manual Penetration Testing

Pentesting is largely divided into two methodologies: Automated vs Manual Penetration Testing. Both have ...
8 Steps in Penetration Testing You Should Know

8 Steps in Penetration Testing You Should Know

Mastering the art of penetration testing has become a critical ability for security experts to combat cyber ...
Spear Phishing vs Whaling: What is the Difference

Spear Phishing vs Whaling: What is the Difference

Spear phishing is a particularly devious type of phishing assault in which the individual targeted plays a ...
How Often Should Penetration Testing Be Done

How Often Should Penetration Testing Be Done

Penetration testing is a crucial technique that involves simulating a cyberattack on networks, computer systems, ...
0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *