skip to main content
10.1145/3582700.3583698acmotherconferencesArticle/Chapter ViewAbstractPublication PagesahsConference Proceedingsconference-collections
demonstration

Conducting and Mitigating Portable Thermal Imaging Attacks on User Authentication using AI-driven Methods

Published:14 March 2023Publication History

ABSTRACT

Thermal cameras have become portable enough to integrate into wearables, such as glasses, and can be used maliciously to infer passwords observing heat traces left on keyboards, keypads and screens. While prior work showed how AI-driven approaches can be used to further enhance the effectiveness of these attacks, we use similar approaches to detect vulnerable interfaces and obfuscate heat traces to defend against thermal attacks. At our Augmented Humans 2023 demo, attendees will have the chance to use a thermal camera to observe thermal traces on a keyboard, and observe how machine learning can both automatically identify keys pressed based and identify, then obfuscate, thermal images of a keyboard to prevent thermal attacks. This demo will provoke thought and discussion about the security risks presented by discrete, wearable thermal cameras and how these risks can be mitigated by both designers and users.

References

  1. Yomna Abdelrahman, Mohamed Khamis, Stefan Schneegass, and Florian Alt. 2017. Stay cool! Understanding thermal attacks on mobile-based user authentication. Conference on Human Factors in Computing Systems - Proceedings 2017-May (2017), 3751–3763. https://doi.org/10.1145/3025453.3025461Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yomna Abdelrahman, Pascal Knierim, Pawel W. Wozniak, Niels Henze, and Albrecht Schmidt. 2017. See through the fire: Evaluating the augmentation of visual perception of firefighters using depth and thermal cameras. In UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. 693–696. https://doi.org/10.1145/3123024.3129269Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yomna Abdelrahman, Albrecht Schmidt, and Pascal Knierim. 2017. Snake view: exploring thermal imaging as a vision extender in mountains. (2017), 1067–1071.Google ScholarGoogle Scholar
  4. Yasmeen Abdrabou, Yomna Abdelrahman, Ahmed Ayman, Amr Elmougy, and Mohamed Khamis. 2020. Are Thermal Attacks Ubiquitous?: When Non-Expert Attackers Use off the shelf Thermal Cameras. In ACM International Conference Proceeding Series. https://doi.org/10.1145/3399715.3399819Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Yasmeen Abdrabou, Reem Hatem, Yomna Abdelrahman, Amr Elmougy, and Mohamed Khamis. 2021. Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones. July (2021), 712–721. https://doi.org/10.1007/978-3-030-85610-6Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yasmeen Abdrabou, Khaled Kassem, Jailan Salah, Reem El-Gendy, Mahesty Morsy, Yomna Abdelrahman, and Slim Abdennadher. 2018. Exploring the usage of EEG and pupil diameter to detect elicited valence. In Intelligent Human Systems Integration: Proceedings of the 1st International Conference on Intelligent Human Systems Integration (IHSI 2018): Integrating People and Intelligent Systems, January 7-9, 2018, Dubai, United Arab Emirates. Springer, 287–293.Google ScholarGoogle ScholarCross RefCross Ref
  7. Norah Alotaibi, Md Shafiqul Islam, Karola Marky, and Mohamed Khamis. 2022. Advanced Techniques for Preventing Thermal Imaging Attacks. In International Conference on Intelligent User Interfaces, Proceedings IUI. 18–21. https://doi.org/10.1145/3490100.3516472Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Norah Alotaibi, John Williamson, and Mohamed Khamis. 2021. ThermoSecure: Investigating the effectiveness of AI-driven thermal attacks on commonly used computer keyboards. Technical Report. https://doi.org/xGoogle ScholarGoogle Scholar
  9. Paul Bekaert, Norah Alotaibi, Florian Mathis, Nina Gerber, Aidan Christopher Rafferty, Mohamed Khamis, and Karola Marky. 2022. Are Thermal Attacks a Realistic Threat? Investigating the Preconditions of Thermal Attacks in Users’ Daily Lives. In NordiCHI ’22. Aarhus, 1–9. https://doi.org/10.1145/3546155.3546706Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sarah Faltaous, Mark Wittpoth, Yomna Abdelrahman, and Stefan Schneegass. 2022. HeatGoggles : Enabling Ubiquitous Touch Input through Head-Mounted Devices using Thermal Imaging. 21th International Conference on Mobile and Ubiquitous Multimedia (MUM 2022), November 27â•fi30, 2022, Lisbon, Portugal 1, 1 (2022), 6–9. https://doi.org/10.1145/3568444.3570597Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt, and Heinrich Hussmann. 2017. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.Google ScholarGoogle Scholar
  12. Tyler Kaczmarek, Ercan Ozturk, and Gene Tsudik. 2019. Thermanator: Thermal residue-based post factum attacks on keyboard data entry. AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security(2019), 586–593. https://doi.org/10.1145/3321705.3329846 arxiv:1806.10189Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Pierre Lecourt. 2015. Flir ONE. https://www.flickr.com/photos/13815526@N02/16051311760/in/photostream/Google ScholarGoogle Scholar
  14. Duo Li, Xiao Ping Zhang, Menghan Hu, Guangtao Zhai, and Xiaokang Yang. 2019. Physical password breaking via thermal sequence analysis. IEEE Transactions on Information Forensics and Security 14, 5(2019), 1142–1154. https://doi.org/10.1109/TIFS.2018.2868219Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao. 2017. Privacy Enhancing Keyboard : Design, Implementation, and Usability Testing. Wireless Communications and Mobile Computing 2017 (2017), 1–15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. 5th USENIX Workshop on Offensive Technologies, WOOT 2011 (2011), 1–8.Google ScholarGoogle Scholar
  17. Wojciech Wodo and Lucjan Hanzlik. 2016. Thermal imaging attacks on keypad security systems. ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications 4, Icete (2016), 458–464. https://doi.org/10.5220/0005998404580464Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Conducting and Mitigating Portable Thermal Imaging Attacks on User Authentication using AI-driven Methods

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            AHs '23: Proceedings of the Augmented Humans International Conference 2023
            March 2023
            395 pages
            ISBN:9781450399845
            DOI:10.1145/3582700

            Copyright © 2023 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 14 March 2023

            Check for updates

            Qualifiers

            • demonstration
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)48
            • Downloads (Last 6 weeks)6

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format