메뉴 건너뛰기




Volumn , Issue , 2009, Pages 17-32

Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; HIDDEN MARKOV MODELS; MULTICORE PROGRAMMING; SECURITY SYSTEMS;

EID: 79959957319     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (101)

References (34)
  • 1
    • 85080587924 scopus 로고    scopus 로고
    • Aug
    • Cryptography/frequency analysis. http://en.wikibooks.org/wiki/Cryptography:Frequency\ analysis, Aug 2006.
    • (2006) Cryptography/Frequency Analysis
  • 3
    • 34547321338 scopus 로고    scopus 로고
    • Dictionary attacks using keyboard acoustics emanations
    • BERGER, Y., WOOL, A., AND YEREDOR, A. Dictionary attacks using keyboard acoustics emanations. In CCS (2006), ACM, pp. 245–254.
    • (2006) CCS , pp. 245-254
    • Berger, Y.1    Wool, A.2    Yeredor, A.3
  • 10
    • 85080567211 scopus 로고    scopus 로고
    • as of September
    • EDIT VIRTUAL LANGUAGE CENTER. Word frequency lists. http://www.edict.com.hk/textanalyser/wordlists.htm, as of September, 2008.
    • (2008) Word Frequency Lists
  • 12
    • 85028301902 scopus 로고
    • Automatic word recognition based on second-order hidden markov models
    • FRANCOIS, M. J., AND PAUL, H. J. Automatic word recognition based on second-order hidden markov models. In ICSLP (1994), pp. 247–250.
    • (1994) ICSLP , pp. 247-250
    • Francois, M.J.1    Paul, H.J.2
  • 13
    • 79959931744 scopus 로고    scopus 로고
    • Analysis of the feasibility of keystroke timing attacks over ssh connections
    • School of Engineering and Applied Science, University of Virginia, December
    • HOGYE, M. A., HUGHES, C. T., SARFATY, J. M., AND WOLF, J. D. Analysis of the feasibility of keystroke timing attacks over ssh connections. Technical Report CS588, School of Engineering and Applied Science, University of Virginia, December 2001.
    • (2001) Technical Report CS588
    • Hogye, M.A.1    Hughes, C.T.2    Sarfaty, J.M.3    Wolf, J.D.4
  • 14
    • 85080500008 scopus 로고    scopus 로고
    • INC., R. Process directories. http://www.redhat.com/docs/manuals/enterprise/RHEL-4-Manual/ en-US/ReferenceGuide/s2-proc-processdirs. html, 2007.
    • (2007) R. Process Directories
  • 16
    • 0025384135 scopus 로고
    • Identity authorization based on keystroke latencies
    • JOYCE, R., AND GUPTA, G. Identity authorization based on keystroke latencies. Communications of the ACM 33, 2 (1990), 168–176.
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 22
  • 24
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • RABINER, L. R. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77, 2 (1989), 257–286.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 26
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on ssh
    • USENIX Association
    • SONG, D. X., WAGNER, D., AND TIAN, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security Symposium (2001), USENIX Association.
    • (2001) USENIX Security Symposium
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 27
    • 85080593074 scopus 로고    scopus 로고
    • August
    • SOURCEFORGE.NET. http://sourceforge.net/projects/strace/, August 2008.
    • (2008) NET
  • 28
    • 85080490315 scopus 로고    scopus 로고
    • TEAM, G. as of September
    • TEAM, G. http://www.gtk.org, as of September, 2008.
    • (2008)
  • 30
    • 85080628808 scopus 로고    scopus 로고
    • TEAM,. as of September
    • TEAM, P. http://pax.grsecurity.net/, as of September, 2008.
    • (2008)
  • 32
    • 85077691389 scopus 로고    scopus 로고
    • Secretly monopolizing the cpu without superuser privileges
    • Berkeley, CA, USA, USENIX Association
    • TSAFRIR, D., ETSION, Y., AND FEITELSON, D. G. Secretly monopolizing the cpu without superuser privileges. In Proceedings of 16th USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 1–18.
    • (2007) Proceedings of 16th USENIX Security Symposium , pp. 1-18
    • Tsafrir, D.1    Etsion, Y.2    Feitelson, D.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.