Methods | Attack medium | Target platform | Attack requirement |
---|---|---|---|
Malboard [21] | Hardware (USB) Keylogger | Computer | 1. Need to install arbitrary keylogger hardware (USB) 2. Require more combinations of keystrokes data collected to achieve higher similarity |
Mimicry [30] | Video of Smartphone Typing Activities (Touchscreen) | Smartphone | 1. Victim’s finger must be visible on the video 2. Attacker needs to train themselves to mimic the victim’s typing behaviour, the proposed method only provides visual real-time guidance |
Our Method | Screen-recorded Video | Both Computer & Smartphone | 1. Victim’s screen must be recorded (e.g., through screen sharing activity) 2. Require more combinations of keystrokes data collected to achieve higher similarity |