{"id":3933,"date":"2023-08-07T17:58:34","date_gmt":"2023-08-07T17:58:34","guid":{"rendered":"https:\/\/dailyai.com\/?p=3933"},"modified":"2023-08-07T18:08:41","modified_gmt":"2023-08-07T18:08:41","slug":"ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision","status":"publish","type":"post","link":"https:\/\/dailyai.com\/de\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/","title":{"rendered":"KI-gest\u00fctzter akustischer Angriff extrahiert Daten aus Tastenanschl\u00e4gen mit 95%-Pr\u00e4zision"},"content":{"rendered":"<p><b>Forscher der britischen Universit\u00e4ten Durham University, University of Surrey und Royal Holloway University of London entwickelten eine innovative KI-gest\u00fctzte Technik zur Extraktion von Tastenanschl\u00e4gen aus akustischen Aufnahmen.\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Die <\/span><a href=\"https:\/\/arxiv.org\/pdf\/2308.01074.pdf\"><span style=\"font-weight: 400;\">Studie<\/span><\/a><span style=\"font-weight: 400;\"> hat eine Technik entwickelt, mit der Tastenanschl\u00e4ge von Tastaturen anhand von Audioaufnahmen erfolgreich gelesen werden k\u00f6nnen. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diese Technik k\u00f6nnte es Hackern erm\u00f6glichen, Tastenanschl\u00e4ge zu analysieren, indem sie das Mikrofon eines Ger\u00e4ts \u00fcbernehmen und pers\u00f6nliche Informationen wie Passw\u00f6rter, private Gespr\u00e4che, Nachrichten und andere sensible Daten sammeln.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Die Tastenanschl\u00e4ge werden \u00fcber ein Mikrofon aufgezeichnet und von einem Modell f\u00fcr maschinelles Lernen (ML) verarbeitet und analysiert, das die Abst\u00e4nde und die Position auf der Tastatur bestimmt.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Das Modell kann einzelne Tastenanschl\u00e4ge mit einer erschreckenden Genauigkeit von 95% identifizieren, wenn die Anschl\u00e4ge \u00fcber ein nahe gelegenes Telefonmikrofon aufgezeichnet werden. Die Vorhersagegenauigkeit verringerte sich auf 93%, wenn \u00fcber Zoom gemachte Aufnahmen zum Trainieren des Algorithmus zur Ger\u00e4uschklassifizierung verwendet wurden.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Akustische Hackerangriffe werden immer raffinierter, da Ger\u00e4te mit Mikrofonen, die qualitativ hochwertigen Ton aufnehmen k\u00f6nnen, weit verbreitet sind.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Wie funktioniert das Modell?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Der Angriff beginnt mit der Aufzeichnung der Tastenanschl\u00e4ge auf der Tastatur der Zielperson. Diese Daten sind entscheidend f\u00fcr das Training des Vorhersagealgorithmus.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diese Aufnahme kann \u00fcber ein Mikrofon in der N\u00e4he oder \u00fcber ein mit Malware infiziertes Telefon der Zielperson erfolgen, das Zugang zu seinem Mikrofon hat.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alternativ k\u00f6nnte ein b\u00f6swilliger Teilnehmer eines Zoom-Anrufs die von der Zielperson getippten Nachrichten mit ihrer Tonaufnahme korrelieren. M\u00f6glicherweise gibt es auch M\u00f6glichkeiten, das Mikrofon des Computers mithilfe von Malware oder Software-Schwachstellen zu hacken.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Die Forscher sammelten Trainingsdaten, indem sie jede der 36 Tasten auf einem modernen MacBook Pro 25 Mal dr\u00fcckten und das Ger\u00e4usch aufzeichneten, das jeder Tastendruck erzeugte. Aus diesen Aufnahmen wurden Wellenformen und Spektrogramme erstellt, die erkennbare Variationen f\u00fcr jede Taste visualisierten.\u00a0<\/span><\/p>\n<figure id=\"attachment_3934\" aria-describedby=\"caption-attachment-3934\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3934 size-large\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-1024x342.png\" alt=\"AI-Tastenanschl\u00e4ge\" width=\"1024\" height=\"342\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-1024x342.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-300x100.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-768x256.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-1536x513.png 1536w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-370x123.png 370w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-800x267.png 800w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-740x247.png 740w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-20x7.png 20w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-1600x534.png 1600w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram-144x48.png 144w, https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/spectrogram.png 1636w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-3934\" class=\"wp-caption-text\">Die Forscher verarbeiteten Audioaufnahmen zu Spektrogrammen, die von einem maschinellen Lernmodell (ML) verarbeitet wurden. Quelle: <a href=\"https:\/\/arxiv.org\/pdf\/2308.01074.pdf\">Ein praktischer, auf Deep Learning basierender Angriff auf akustische Seitenkan\u00e4le in Tastaturen<\/a>.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Die Daten wurden weiter verarbeitet, um die Signale zur Identifizierung der Tastenanschl\u00e4ge zu verbessern.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diese Spektrogrammbilder wurden verwendet, um \"CoAtNet\" zu trainieren, einen Bildklassifikator, der verschiedene Audiospektrogramme verschiedenen Tastenanschl\u00e4gen zuordnet.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">F\u00fcr ihre Tests verwendeten die Forscher einen Laptop mit einer Tastatur, die neueren Apple-Laptops \u00e4hnelt. Zu den Mikrofonen und Aufnahmemethoden geh\u00f6rten ein iPhone 13 Mini, das 17 cm von der Zielperson entfernt aufgestellt wurde, Zoom und Skype.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Der CoANet-Klassifikator zeigte eine Genauigkeit von 95% bei Smartphone-Aufnahmen und 93% bei Aufnahmen, die \u00fcber Zoom gemacht wurden. Sie testeten auch \u00fcber Skype aufgezeichnete Tastenanschl\u00e4ge, die eine Genauigkeit von 91,7% ergaben.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Das Forschungspapier schl\u00e4gt vor, den Tippstil zu \u00e4ndern oder zuf\u00e4llige Passw\u00f6rter zu verwenden, um solche Angriffe zu verhindern, aber das ist alles andere als praktisch.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Weitere m\u00f6gliche Abwehrma\u00dfnahmen sind der Einsatz von Software zur Reproduktion von Tastenanschlagger\u00e4uschen, wei\u00dfes Rauschen oder softwarebasierte Tastenanschlag-Audiofilter. <\/span><span style=\"font-weight: 400;\">Die Studie ergab jedoch, dass selbst eine stumme Tastatur erfolgreich auf Tastenanschl\u00e4ge analysiert werden kann.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dies ist ein weiteres neues Beispiel daf\u00fcr, wie maschinelles Lernen die <a href=\"https:\/\/dailyai.com\/de\/2023\/06\/ai-related-fraud-could-cost-us-taxpayers-up-to-1-trillion-according-to-analyst\/\">ausgekl\u00fcgelte Betrugstechniken<\/a>. A <a href=\"https:\/\/dailyai.com\/de\/2023\/08\/ai-generated-deep-fake-voices-trick-over-1-4-of-participants-in-a-new-study\/\">aktuelle Studie<\/a> fanden heraus, dass tiefe, gef\u00e4lschte Audiostimmen bis zu 25% der Menschen t\u00e4uschen k\u00f6nnen.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Audio-Angriffe k\u00f6nnten auf hochrangige Personen wie Politiker und CEOs abzielen, um sensible Informationen zu stehlen oder Ransomware-Angriffe auf der Grundlage gestohlener Gespr\u00e4che zu starten.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Forscher der britischen Universit\u00e4ten Durham University, University of Surrey und Royal Holloway University of London entwickelten eine innovative KI-gest\u00fctzte Technik zur Extraktion von Tastenanschl\u00e4gen aus akustischen Aufnahmen.  Im Rahmen der Studie wurde eine Technik entwickelt, mit der Tastenanschl\u00e4ge von Tastaturen anhand von Audioaufnahmen ausgelesen werden k\u00f6nnen. Diese Technik k\u00f6nnte es Hackern erm\u00f6glichen, Tastenanschl\u00e4ge zu analysieren, indem sie das Mikrofon eines Ger\u00e4ts \u00fcbernehmen und pers\u00f6nliche Informationen wie Passw\u00f6rter, private Unterhaltungen, Nachrichten und andere sensible Daten sammeln.  Die Tastenanschl\u00e4ge werden \u00fcber ein Mikrofon aufgezeichnet und von einem Modell f\u00fcr maschinelles Lernen (ML) verarbeitet und analysiert, das die Abst\u00e4nde und die Position auf der Tastatur bestimmt.  Das Modell kann einzelne Tastenanschl\u00e4ge mit<\/p>","protected":false},"author":2,"featured_media":3935,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[161,283,105],"class_list":["post-3933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-fraud","tag-hackers","tag-machine-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI-powered acoustic attack extracts data from keystrokes with 95% precision | DailyAI<\/title>\n<meta name=\"description\" content=\"Researchers from UK universities Durham University, University of Surrey, and Royal Holloway University of London developed an innovative AI-supported technique for extracting keystrokes from acoustic recordings.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/de\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-powered acoustic attack extracts data from keystrokes with 95% precision | DailyAI\" \/>\n<meta property=\"og:description\" content=\"Researchers from UK universities Durham University, University of Surrey, and Royal Holloway University of London developed an innovative AI-supported technique for extracting keystrokes from acoustic recordings.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/de\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-07T17:58:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-07T18:08:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Jeans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Jeans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/\"},\"author\":{\"name\":\"Sam Jeans\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/711e81f945549438e8bbc579efdeb3c9\"},\"headline\":\"AI-powered acoustic attack extracts data from keystrokes with 95% precision\",\"datePublished\":\"2023-08-07T17:58:34+00:00\",\"dateModified\":\"2023-08-07T18:08:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/\"},\"wordCount\":510,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/shutterstock_1854700519.jpg\",\"keywords\":[\"Fraud\",\"Hackers\",\"machine learning\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/\",\"name\":\"AI-powered acoustic attack extracts data from keystrokes with 95% precision | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/shutterstock_1854700519.jpg\",\"datePublished\":\"2023-08-07T17:58:34+00:00\",\"dateModified\":\"2023-08-07T18:08:41+00:00\",\"description\":\"Researchers from UK universities Durham University, University of Surrey, and Royal Holloway University of London developed an innovative AI-supported technique for extracting keystrokes from acoustic recordings.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/shutterstock_1854700519.jpg\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/shutterstock_1854700519.jpg\",\"width\":1000,\"height\":667,\"caption\":\"AI microphone scam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2023\\\/08\\\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-powered acoustic attack extracts data from keystrokes with 95% precision\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/711e81f945549438e8bbc579efdeb3c9\",\"name\":\"Sam Jeans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"caption\":\"Sam Jeans\"},\"description\":\"Sam is a science and technology writer who has worked in various AI startups. When he\u2019s not writing, he can be found reading medical journals or digging through boxes of vinyl records.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/sam-jeans-6746b9142\\\/\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/de\\\/author\\\/samjeans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KI-gest\u00fctzter akustischer Angriff extrahiert Daten aus Tastenanschl\u00e4gen mit 95% Pr\u00e4zision | DailyAI","description":"Forscher der britischen Universit\u00e4ten Durham University, University of Surrey und Royal Holloway University of London entwickelten eine innovative KI-gest\u00fctzte Technik zur Extraktion von Tastenanschl\u00e4gen aus akustischen Aufnahmen.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/de\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/","og_locale":"de_DE","og_type":"article","og_title":"AI-powered acoustic attack extracts data from keystrokes with 95% precision | DailyAI","og_description":"Researchers from UK universities Durham University, University of Surrey, and Royal Holloway University of London developed an innovative AI-supported technique for extracting keystrokes from acoustic recordings.\u00a0","og_url":"https:\/\/dailyai.com\/de\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/","og_site_name":"DailyAI","article_published_time":"2023-08-07T17:58:34+00:00","article_modified_time":"2023-08-07T18:08:41+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg","type":"image\/jpeg"}],"author":"Sam Jeans","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"Verfasst von":"Sam Jeans","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/"},"author":{"name":"Sam Jeans","@id":"https:\/\/dailyai.com\/#\/schema\/person\/711e81f945549438e8bbc579efdeb3c9"},"headline":"AI-powered acoustic attack extracts data from keystrokes with 95% precision","datePublished":"2023-08-07T17:58:34+00:00","dateModified":"2023-08-07T18:08:41+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/"},"wordCount":510,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg","keywords":["Fraud","Hackers","machine learning"],"articleSection":["Industry"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/","url":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/","name":"KI-gest\u00fctzter akustischer Angriff extrahiert Daten aus Tastenanschl\u00e4gen mit 95% Pr\u00e4zision | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg","datePublished":"2023-08-07T17:58:34+00:00","dateModified":"2023-08-07T18:08:41+00:00","description":"Forscher der britischen Universit\u00e4ten Durham University, University of Surrey und Royal Holloway University of London entwickelten eine innovative KI-gest\u00fctzte Technik zur Extraktion von Tastenanschl\u00e4gen aus akustischen Aufnahmen.\u00a0","breadcrumb":{"@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/08\/shutterstock_1854700519.jpg","width":1000,"height":667,"caption":"AI microphone scam"},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2023\/08\/ai-powered-acoustic-attack-extracts-data-from-keystrokes-with-95-precision\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"AI-powered acoustic attack extracts data from keystrokes with 95% precision"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Ihre t\u00e4gliche Dosis an AI-Nachrichten","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/711e81f945549438e8bbc579efdeb3c9","name":"Sam Jeans","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","caption":"Sam Jeans"},"description":"Sam ist ein Wissenschafts- und Technologiewissenschaftler, der in verschiedenen KI-Startups gearbeitet hat. Wenn er nicht gerade schreibt, liest er medizinische Fachzeitschriften oder kramt in Kisten mit Schallplatten.","sameAs":["https:\/\/www.linkedin.com\/in\/sam-jeans-6746b9142\/"],"url":"https:\/\/dailyai.com\/de\/author\/samjeans\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/posts\/3933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/comments?post=3933"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/posts\/3933\/revisions"}],"predecessor-version":[{"id":3938,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/posts\/3933\/revisions\/3938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/media\/3935"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/media?parent=3933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/categories?post=3933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/de\/wp-json\/wp\/v2\/tags?post=3933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}