Cracking safes with thermal imaging
(as a more viable alternative to mind reading)
Copyright (C) 2005 by Michal Zalewski (lcamtuf@coredump.cx)

This inexplicably brief "research" paper presents an interesting physical world attack that may be easily deployed by a determined attacker to compromise many high-security access control systems in use today. Although this paper's findings are hardly groundbreaking (and in some ways, are downright obvious), it includes some cool pictures of what should be most certainly taken into account in risk management, secure zone planning, and when drafting operating procedures for high-risk areas. But most of all, I just wanted to share.

In short, virtually all keypad entry systems - as used in various applications, including building access control, alarm system control, electronic lock safes, ATM input, etc - are susceptible to a trivial low-profile passphrase snooping scheme. This attack enables the attacker to quickly and unobtrusively recover previously entered passphrases with a high degree of success. This is in contrast to previously documented methods of keypad snooping; these methods were in general either highly intrusive - required close presence or installation of specialized hardware - or difficult to carry out and not very reliable (e.g., examining deposited fingerprints - which works in low-use situations only, and does not reveal the ordering of the digits).

The attacker can perform the attack by deploying an uncooled microbolometer thermal imaging (far infrared) camera within up to approximately five minutes after valid keycode entry. The heat transferred during split-second contact of individual keys with human body is significant enough and dissipates slowly enough to make this possible after the area has been cleared of all personnel.

Furthermore, since the image can be acquired from a considerable distance (1-10 meters is easy to achieve), the attacker can afford to maintain a remarkably low profile through the process.

Portable (handheld) thermal imaging devices, such as the one pictured above, are commercially available from manufacturers such as Flir or Fluke. Prices begin at $5,000 to $10,000 for brand new units, and top-of-the-line models boast a 0.05 K thermal resolution at impressively low sensor noise levels.

The following sequence of images demonstrates the feasibility of the attack; in this case, the target is LA GARD ComboGard 3035 electronic lock (with rubber keys) installed on an industrial-grade safe:

Keypad: visible light Keypad: thermal imaging

Keypad in idle state - in visible light (left) and in thermal imaging (right). Minimal ambient temperature variations are present due to different thermal characteristics of materials used in the safe.

Hand: visible light Hand: thermal imaging

A sequence of keys is being pressed (1-5-9). The difference in colors on the right is due to IR camera automatically adjusting to relatively high temperature of human body, to avoid overexposure and blooming.

Residual image: thermal imaging

Code entry complete. All pressed keys are still clearly readable in this thermogram; the sequence of digits can be infered from the relative temperature of these spots - ones with lower registered temperature (more faint color) were pressed earlier than others.

There are some real-world caveats: for example, reuse of digits in a code, rapid code entry, vastly differing keypress times, and other quirks (say, victim's habit of resting his palm on the keypad) may render the attack less successful. That said, it's still nifty, and apparently not limited to bad science-fiction or computer games.

A proper defense against such techniques would be not to rely on keypad-only access control in easily accessible areas, unless additional advanced countermeasures can be implemented (well-implemented scrambling keypads originally intended to thwart fingerprint or key wear analysis, for example). Smart-card, biometric, or plain old key-based protection can be added to reduce exposure.


Copyright (C) 2005 by Michal Zalewski (lcamtuf@coredump.cx) You are a visitor number 23810853.