Assessing security of wireless keyboard protocols

Organization
Cybersecurity
Abstract
In recent years the use of wireless keyboard and mouse technologies have gained popularity.

The aim of this work is to study the security of these wireless protocols to see whether an attacker could learn the keystrokes sent over the air.

There are several publicly known attacks on wireless keyboards and mice. Some of the most popular are MouseJack, KeyJack and LOGITacker.

The potential task includes analyzing publicly documented attacks and weaknesses, implementing them and describing the success.

A Logitech keyboard/mouse pair will be provided as well as a nRF52840 Dongle for testing.

Alternatively, the wireless transmission protocol of a random keyboard can be assessed using the HackRF SDR.

Links:
https://www.mousejack.com/
https://www.bastille.net/research/vulnerabilities/keyjack/keyjack-intro
https://github.com/RoganDawes/LOGITacker
https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF52840-Dongle
https://greatscottgadgets.com/hackrf/one/
Graduation Theses defence year
2019-2020
Supervisor
Danielle Morgan
Spoken language (s)
English
Requirements for candidates
Level
Keywords
#acs

Application of contact

 
Name
Danielle Morgan
Phone
E-mail
danielle.morgan@ut.ee
See more
https://acs.cs.ut.ee/