The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers

Date

2024-04-23

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

We analyzed the security of cloud-based pinyin keyboard apps from nine vendors — Baidu, Honor, Huawei, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi — and examined their transmission of users' keystrokes for vulnerabilities. Our analysis revealed critical vulnerabilities in keyboard apps from eight out of the nine vendors in which we could exploit that vulnerability to completely reveal the contents of users’ keystrokes in transit. Most of the vulnerable apps can be exploited by an entirely passive network eavesdropper. We reported these vulnerabilities to all nine vendors. Most vendors responded, took the issue seriously, and fixed the reported vulnerabilities, although some keyboard apps remain vulnerable

Description

Keywords

software vulnerability, keyboard, China, keystrokes, network

Citation

Jeffrey Knockel, Mona Wang, and Zoë Reichert. “The not-so-silent type: Vulnera- bilities across keyboard apps reveal keystrokes to network eavesdroppers,” Cit- izen Lab Report No. 175, University of Toronto, April 2024. Available at: https: //citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystroke s-to-network-eavesdroppers/.

DOI

ISSN

Creative Commons

Attribution-ShareAlike 4.0 International

Collections

Items in TSpace are protected by copyright, with all rights reserved, unless otherwise indicated.