Capacitive Touchscreens at Risk: Recovering Handwritten Trajectory on Smartphone via Electromagnetic Emanations
By: Yukun Cheng , Shiyu Zhu , Changhai Ou and more
Potential Business Impact:
Steals your handwriting by listening to your phone.
This paper reveals and exploits a critical security vulnerability: the electromagnetic (EM) side channel of capacitive touchscreens leaks sufficient information to recover fine-grained, continuous handwriting trajectories. We present Touchscreen Electromagnetic Side-channel Leakage Attack (TESLA), a non-contact attack framework that captures EM signals generated during on-screen writing and regresses them into two-dimensional (2D) handwriting trajectories in real time. Extensive evaluations across a variety of commercial off-the-shelf (COTS) smartphones show that TESLA achieves 77% character recognition accuracy and a Jaccard index of 0.74, demonstrating its capability to recover highly recognizable motion trajectories that closely resemble the original handwriting under realistic attack conditions.
Similar Papers
Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones
Cryptography and Security
Lets hackers steal phone secrets using tiny signals.
EMPalm: Exfiltrating Palm Biometric Data via Electromagnetic Side-Channels
Cryptography and Security
Steals palm scans from device signals.
Sliding Speed Influences Electrovibration-Induced Finger Friction Dynamics on Touchscreens
Human-Computer Interaction
Makes touchscreens feel like different textures.