120 likes | 318 Views
Timing Analysis Techniques. CS 858 Project Presentation Nam Pham, Prima Chairunnanda. Inspiration (funny images?). Overview. Introduction Threat Model Potential Attacks Keyboard Acoustic Emanations Timing Analysis Comparison with Fingerprinting Techniques Our experiment
E N D
Timing Analysis Techniques CS 858 Project Presentation Nam Pham, Prima Chairunnanda
Inspiration (funny images?) Nam Pham
Overview • Introduction • Threat Model • Potential Attacks • Keyboard Acoustic Emanations • Timing Analysis • Comparison with Fingerprinting Techniques • Our experiment • Conclusion and Discussion Nam Pham
Threat Model • Who could become our adversaries? • What do they know? Nam Pham
Keystrokes Analysis • Types of Keystrokes Analysis: • Acoustic • Timing Nam Pham
Keyboard Acoustic Emanations • Summary of “keyboard acoustic emanations revisited” Nam Pham
Inter-keystrokes Timing Analysis • Summary of “Timing Analysis of Keystrokes and Timing Attacks on SSH” • The latency of character pairs • Hidden Markov Model Nam Pham
Our experiment • Hypothesis • Study Setup • How many participants? • How big is the data set? Nam Pham
Experimental Results • Size of the training data • Our accuracy • Is it feasible to defeat anonymous browsing modes? Nam Pham
Future Works Nam Pham
Conclusion Nam Pham
Discussion Nam Pham