【24h】

Timing Attacks on PIN Input Devices

机译:PIN输入设备的定时攻击

获取原文
获取原文并翻译 | 示例

摘要

Keypads are commonly used to enter personal identification numbers (PIN) which are intended to authenticate a user based on what they know. A number of those keypads such as ATM inputs and door keypads provide an audio feedback to the user for each button pressed. Such audio feedback are observable from a modest distance. We are looking at quantifying the information leaking from delays between acoustic feedback pulses. Preliminary experiments suggest that by using a Hidden Markov Model, it might be possible to substantially narrow the search space. A subsequent brute force search on the reduced search space could be possible without triggering alerts, lockouts or other mechanisms design to thwart plain brute force attempts.
机译:键盘通常用于输入个人识别码(PIN),该识别码用于根据用户知道的信息对用户进行身份验证。许多这样的键盘,例如ATM输入和门键盘,会为每个按下的按钮向用户提供音频反馈。从适度的距离可以观察到这种音频反馈。我们正在研究量化由于声反馈脉冲之间的延迟而泄漏的信息。初步实验表明,通过使用隐马尔可夫模型,可能有可能大幅缩小搜索空间。可以在减少的搜索空间上进行后续的暴力搜索,而无需触发警报,锁定或其他机制来阻止普通的暴力尝试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号