LaserKey: Eavesdropping Keyboard Typing Leveraging Vibrational Emanations via Laser Sensing

Published: 01 Jan 2025, Last Modified: 20 May 2025IEEE Trans. Mob. Comput. 2025EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Reconstructing keyboard input through side-channel attacks has posed significant threats to user security. While conventional keystroke eavesdropping attacks have demonstrated effectiveness using side channels such as acoustic signals, they are usually shorter in range and can be significantly affected by environmental noises. In this paper, we propose LaserKey, a novel keystroke eavesdropping technique that leverages the long-range and noise-resistant nature of lasers to achieve a more stealthy side-channel attack. We utilize laser sensors to accurately capture the subtle vibrations induced on laptop screens by keystrokes, and innovatively design a laser-driven deep learning-based keystroke recognition model with the inputs being the Mel-frequency Cepstral Coefficien (MFCC), Time Difference of Arrival (TDoA), and amplitude features extracted from such vibration signals. Through systematic experiments, we demonstrate that LaserKey achieves a 92.2% single-key recognition accuracy. By combining multiple single-key recognition capabilities based on this, we then realize the end-to-end word-level recognition. Moreover, to mitigate the recognition errors caused by the changes in keystroke positions, we introduce a meta-learning based domain generalization approach for achieving robust laser position calibration. Results show that LaserKey achieves as low as 3% character error rate (CER) for word-level recognition, proving its effectiveness for long-range and high-accuracy keystroke eavesdropping, and highlighting the necessity for countermeasures in the future.
Loading