Search papers, labs, and topics across Lattice.
The paper introduces PINSIGHT, a methodology using a robotic typing platform to rigorously evaluate the generalization capabilities of Wi-Fi-based PIN code inference attacks across varied environments. By separating the effects of environmental variation and PIN code typing, PINSIGHT creates a benchmark dataset for environment generalization. Evaluation of state-of-the-art methods reveals that while attacks generalize well across environmental changes, they degrade significantly when the channel's encoding of typing shifts, suggesting current performance metrics overestimate real-world threat.
Wi-Fi PIN inference attacks, previously thought to be a major threat, crumble when faced with realistic typing variations, revealing that current performance metrics are misleading.
Wi-Fi signals can be exploited by adversaries as a sensing side channel to eavesdrop on physical information. By monitoring propagation effects of radio waves within the victim's environment, attackers can remotely infer sensitive information. One particularly concerning example is PIN code inference, where the attacker faces the challenge of mapping Wi-Fi physical-layer channel estimations back into typed digits. While effective in their training environment, such attacks typically fail as soon as they are deployed in unseen environments. The current state-of-the-art attack, WiKI-Eve, attempts to overcome this problem using a deep-learning approach, reporting high PIN code inference accuracy independent of environments, devices, and users. While this suggests a significant real-world threat, it is not well understood how far the attack actually reaches, nor what its underlying generalization performance is based on. In this work, we close this gap by presenting PINSIGHT, a novel methodology that separates the effects of environmental variation and PIN code typing. This enables the first rigorous threat assessment of such attacks, evaluating their generalization capabilities and limitations. Our approach leverages a robotic typing platform that produces highly repeatable keystroke events across systematically varied environment changes [...]. This dataset constitutes the first benchmark for environment generalization in Wi-Fi PIN code inference attacks. Evaluating several state-of-the-art methods, we find that attacks generalize reliably across changes in the surrounding environment but degrade substantially when the channel's encoding of typing itself shifts - precisely the condition that defines a realistic attack scenario. We conclude that the reported performance of current state-of-the-art Wi-Fi PIN inference attacks is not representative of the actual real-world threat.