


{"id":14184,"date":"2023-08-20T03:47:03","date_gmt":"2023-08-19T22:17:03","guid":{"rendered":"https:\/\/vajiramandravi.com\/current-affairs\/?p=14184"},"modified":"2025-04-02T11:00:26","modified_gmt":"2025-04-02T05:30:26","slug":"acoustic-side-channel-attack","status":"publish","type":"post","link":"https:\/\/vajiramandravi.com\/current-affairs\/acoustic-side-channel-attack\/","title":{"rendered":"Acoustic Side Channel Attack"},"content":{"rendered":"<h2><strong>About Acoustic Side Channel Attack:\u00a0<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li>This technique uses the <strong>sounds produced by typing on a keyboard<\/strong> to determine what keys are being pressed.<\/li>\n<li>By analysing these unique sounds, <strong>hackers equipped with the right tools can decode<\/strong> the precise letters and numbers being typed.<\/li>\n<li>Researchers investigated the use of audio recordings taken <strong>from Zoom video conferencing calls, smartphone microphones,<\/strong> and off-the-shelf equipment and algorithms to launch ASCA attacks.<\/li>\n<li>The study found that when trained on keystrokes by a nearby phone, the classifier <strong>achieved an accuracy of 95%,<\/strong> the highest accuracy seen without the use of a language model.<\/li>\n<li><strong>Accuracy<\/strong>\n<ul>\n<li>When a deep learning model was <strong>trained on the data with default values<\/strong>, the model was able to acquire a <strong>meaningful interpretation of the data<\/strong>.<\/li>\n<li>On a MacBook Pro, which features a keyboard identical in switch design to Apple\u2019s models from the last two years, the model <strong>was able to achieve state-of-the-art accuracy<\/strong> with minimal training data.<\/li>\n<li>Additionally, when <strong>the AI model<\/strong> was made to recognise keystrokes using audio captured through a smartphone microphone, it was able to <strong>achieve 95% accuracy.<\/strong><\/li>\n<\/ul>\n<\/li>\n<li><strong>Implications\u00a0<\/strong>\n<ul>\n<li>This form of hacking <strong>could expose sensitive information<\/strong> like passwords and personal messages.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>\u00a0<\/h3>\n<h3>What are Side Channel Attacks (SCAs)?<\/h3>\n<ul>\n<li>These are a method of <strong>hacking a cryptographic algorithm<\/strong> based on the analysis of auxiliary systems used in the encryption method.<\/li>\n<li>These can be performed using a collection of signals emitted by devices, including <strong>electromagnetic waves, power consumption, mobile sensors<\/strong> as well as sound from keyboards and printers to target devices.<\/li>\n<li>Once collected, these signals are used to interpret signals that can be then used to <strong>compromise the security of a device.<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3>Q1) What is Hacking?<\/h3>\n<p>Hacking refers to the act of gaining unauthorized access to computer systems, networks, or digital devices with the intent of manipulating, stealing, or altering data or information.<\/p>\n<p><strong>Source:<\/strong>\u00a0<a href=\"https:\/\/www.thehindu.com\/sci-tech\/technology\/what-are-acoustic-side-channel-attacks-and-how-is-ai-used-to-increase-its-accuracy\/article67216538.ece\" target=\"_blank\" rel=\"nofollow noopener\">What are Acoustic Side Channel Attacks and how is AI used to increase its accuracy?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acoustic Side Channel Attack uses the sounds produced by typing on a keyboard to determine what keys are being pressed.<\/p>\n","protected":false},"author":5,"featured_media":14185,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-14184","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-upsc-prelims-current-affairs","8":"no-featured-image-padding"},"acf":[],"_links":{"self":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts\/14184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/comments?post=14184"}],"version-history":[{"count":0,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/posts\/14184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/media\/14185"}],"wp:attachment":[{"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/media?parent=14184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/categories?post=14184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vajiramandravi.com\/current-affairs\/wp-json\/wp\/v2\/tags?post=14184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}