SlideShare a Scribd company logo
1 of 12
• COURCE NAME :cyber security
• COLLAGE NAME :NOBAL GROUP OF INSTITUTE
• COLLAGE CODE :035
• Attack name: Thermanator Attack
SR.NO NAMES BRANCH ROLL NO
1 PAMBHAR PARIMAL CSE 160350107031
2 THUMAR KISHAN CSE 160350107040
3 DALSANIA DEEP IT 160350116002
Thermanator Attack
• he attack, called "Thermanator", could use your body heat
against you in order to steal your credentials or any other
short string of text that you have typed on a computer
keyboard
History
• A team of academics from the University of
California, Irvine (UCI), have presented a type
of attack that could enable a malefactor to
retrieve sensitive information you entered via
your keyboard – possibly up to a minute after
you typed it.
• Founder Name:Tomáš Foltýn
• 6 Jul 2018 - 04:33PM
Research
• The researchers had 30 users enter 10
different password , both strong and weak, on four
common external keyboards. Using a thermal
imaging camera, the researchers then scanned the
residual heat left on the recently-pressed keys. In the
second stage, they enlisted the help of eight non-
experts in the field who, acting as “adversaries”, were
asked to derive the set of pressed keys from the
thermal imaging data – which they reliably did.
Thermanator attack can recover
passwords, PINs
• The UCI team calls this attack Thermanator, and they
say it can be used to recover short strings of text, may
it be a verification code, a banking PIN, or password.
• Attackers need to be able to place a camera with
thermal recording features near a victim, and the
camera must have a clear view of the keys for the
Thermanator attack to work.
• But when these conditions are met, an attacker, even
a non-expert one, can recover a collection of keys the
victim has pressed, keys which it can later assemble
into possible strings to be used in a dictionary attack.
Passwords can be recovered up to
30 seconds after input
• In laboratory experiments, the research team had 31 users
enter passwords on four different keyboard types. UCI
researchers then asked eight non-experts to derive the set
of pressed keys from the recorded thermal imaging data.
Step of Attack
How to prevent this attack
• Researchers say that users who type using a
"hunt and peck" technique of pressing one key
at a time with two fingers while continually
looking at the keyboard are more susceptible
to having their key presses harvested by this
technique.
UCI researchers: Passwords must go
• One of the conclusions of this research is that over the years several
academics have devised several types of attacks for recording
passwords in various ways, such as through mechanical vibrations,
electromagnetic emanations, and more. The research team argues
that it may be time to move away from passwords as a means to
secure user data and equipment.
• "As formerly niche sensing devices become less and less expensive,
new side-channel attacks move from 'Mission: Impossible' towards
reality," researchers said. "This is especially true considering the
constantly decreasing cost and increasing availability of high-quality
thermal imagers."
• More details about the UCI team's research can be found in a paper
titled "Thermanator: Thermal Residue-Based Post Factum Attacks
On Keyboard Password Entry."
• Related Articles:
Thermanator Attack

More Related Content

Similar to Thermanator Attack

Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...Gurbir Singh
 
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docxUMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docxwillcoxjanay
 

Similar to Thermanator Attack (6)

Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docxUMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
 
F0391041048
F0391041048F0391041048
F0391041048
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 

More from Deep Dalsania

Gauss Forward And Backward Central Difference Interpolation Formula
 Gauss Forward And Backward Central Difference Interpolation Formula  Gauss Forward And Backward Central Difference Interpolation Formula
Gauss Forward And Backward Central Difference Interpolation Formula Deep Dalsania
 
The Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaThe Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaDeep Dalsania
 
Vapour Absorption Refrigeration System
Vapour Absorption Refrigeration SystemVapour Absorption Refrigeration System
Vapour Absorption Refrigeration SystemDeep Dalsania
 
Partial Differentiation
Partial DifferentiationPartial Differentiation
Partial DifferentiationDeep Dalsania
 
First Order Ordinary Differential Equation
First Order Ordinary Differential EquationFirst Order Ordinary Differential Equation
First Order Ordinary Differential EquationDeep Dalsania
 

More from Deep Dalsania (6)

Tech Totes Club
Tech Totes ClubTech Totes Club
Tech Totes Club
 
Gauss Forward And Backward Central Difference Interpolation Formula
 Gauss Forward And Backward Central Difference Interpolation Formula  Gauss Forward And Backward Central Difference Interpolation Formula
Gauss Forward And Backward Central Difference Interpolation Formula
 
The Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six SigmaThe Quality Standard: ISO 9000 , CMM and Six Sigma
The Quality Standard: ISO 9000 , CMM and Six Sigma
 
Vapour Absorption Refrigeration System
Vapour Absorption Refrigeration SystemVapour Absorption Refrigeration System
Vapour Absorption Refrigeration System
 
Partial Differentiation
Partial DifferentiationPartial Differentiation
Partial Differentiation
 
First Order Ordinary Differential Equation
First Order Ordinary Differential EquationFirst Order Ordinary Differential Equation
First Order Ordinary Differential Equation
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Thermanator Attack

  • 1. • COURCE NAME :cyber security • COLLAGE NAME :NOBAL GROUP OF INSTITUTE • COLLAGE CODE :035 • Attack name: Thermanator Attack
  • 2. SR.NO NAMES BRANCH ROLL NO 1 PAMBHAR PARIMAL CSE 160350107031 2 THUMAR KISHAN CSE 160350107040 3 DALSANIA DEEP IT 160350116002
  • 3.
  • 4. Thermanator Attack • he attack, called "Thermanator", could use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard
  • 5. History • A team of academics from the University of California, Irvine (UCI), have presented a type of attack that could enable a malefactor to retrieve sensitive information you entered via your keyboard – possibly up to a minute after you typed it. • Founder Name:Tomáš Foltýn • 6 Jul 2018 - 04:33PM
  • 6. Research • The researchers had 30 users enter 10 different password , both strong and weak, on four common external keyboards. Using a thermal imaging camera, the researchers then scanned the residual heat left on the recently-pressed keys. In the second stage, they enlisted the help of eight non- experts in the field who, acting as “adversaries”, were asked to derive the set of pressed keys from the thermal imaging data – which they reliably did.
  • 7. Thermanator attack can recover passwords, PINs • The UCI team calls this attack Thermanator, and they say it can be used to recover short strings of text, may it be a verification code, a banking PIN, or password. • Attackers need to be able to place a camera with thermal recording features near a victim, and the camera must have a clear view of the keys for the Thermanator attack to work. • But when these conditions are met, an attacker, even a non-expert one, can recover a collection of keys the victim has pressed, keys which it can later assemble into possible strings to be used in a dictionary attack.
  • 8. Passwords can be recovered up to 30 seconds after input • In laboratory experiments, the research team had 31 users enter passwords on four different keyboard types. UCI researchers then asked eight non-experts to derive the set of pressed keys from the recorded thermal imaging data.
  • 10. How to prevent this attack • Researchers say that users who type using a "hunt and peck" technique of pressing one key at a time with two fingers while continually looking at the keyboard are more susceptible to having their key presses harvested by this technique.
  • 11. UCI researchers: Passwords must go • One of the conclusions of this research is that over the years several academics have devised several types of attacks for recording passwords in various ways, such as through mechanical vibrations, electromagnetic emanations, and more. The research team argues that it may be time to move away from passwords as a means to secure user data and equipment. • "As formerly niche sensing devices become less and less expensive, new side-channel attacks move from 'Mission: Impossible' towards reality," researchers said. "This is especially true considering the constantly decreasing cost and increasing availability of high-quality thermal imagers." • More details about the UCI team's research can be found in a paper titled "Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry." • Related Articles: