PowerBI Data Analyst - Create visualizations and dashboards from scratch
Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the history, techniques, and implications of keylogging side channel attacks in this IEEE Symposium on Security & Privacy presentation. Delve into the evolution of these attacks from early electromagnetic spikes to modern microarchitectural and network-based methods. Examine the concepts of spatial and temporal side channels, evaluating their effectiveness in compromising typed English text. Investigate how typing speed and style influence the information gained through temporal features. Gain insights into state-of-the-art keylogging attacks and potential mitigation strategies to enhance cybersecurity awareness and defense mechanisms.
Syllabus
Intro
What is a keystroke
Keylogging
History
Spatial Side Channels
Temporal Side Channels
Biometric menagerie
Behavior homogeneity
Summary
Questions
Taught by
IEEE Symposium on Security and Privacy