Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2810103.2813668acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

When Good Becomes Evil: Keystroke Inference with Smartwatch

Published: 12 October 2015 Publication History

Abstract

One rising trend in today's consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions of smartwatches shipped, however, the security implications of such devices are not fully understood. Although previous studies have pointed out some privacy concerns about the data that can be collected, like personalized health information, the threat is considered low as the leaked data is not highly sensitive and there is no real attack implemented. In this paper we investigate a security problem coming from sensors in smartwatches, especially the accelerometer. The results show that the actual threat is much beyond people's awareness. Being worn on the wrist, the accelerometer built within a smartwatch can track user's hand movements, which makes inferring user inputs on keyboards possible in theory. But several challenges need to be addressed ahead in the real-world settings: e.g., small and irregular hand movements occur persistently during typing, which degrades the tracking accuracy and sometimes even overwhelms useful signals.
In this paper, we present a new and practical side-channel attack to infer user inputs on keyboards by exploiting sensors in smartwatch. Novel keystroke inference models are developed to mitigate the negative impacts of tracking noises. We focus on two major categories of keyboards: one is numeric keypad that is generally used to input digits, and the other is QWERTY keyboard on which a user can type English text. Two prototypes have been built to infer users' banking PINs and English text when they type on POS terminal and QWERTY keyboard respectively. Our results show that for numeric keyboard, the probability of finding banking PINs in the top 3 candidates can reach 65%, while for QWERTY keyboard, a significant accuracy improvement is achieved compared to the previous works, especially of the success rate of finding the correct word in the top 10 candidates.

References

[1]
Android wear. https://developer.android.com/wear/index.html.
[2]
As smartwatches gain traction, personal data privacy worries mount. http://www.computerworld.com/article/2925311/wearables/as-smartwatches-gain-traction-personal-data-privacy-worries-mount.html.
[3]
Bbc news. http://www.bbc.com/news/.
[4]
Cancer patients with depression 'are being overlooked'. http://www.bbc.com/news/health-28954661.
[5]
The corncob list of more than 58 000 english words. http://www.mieliestronk.com/wordlist.html.
[6]
Cubic spline data interpolation. http://www.mathworks.com/help/matlab/ref/spline.html.
[7]
'deaths averted' at hospitals put into special measures. http://www.bbc.com/news/health-31166211.
[8]
Detrending data. http://www.mathworks.com/help/matlab/data_analysis/detrending-data.html.
[9]
Ebola crisis: Experimental vaccine 'shipped to liberia'. http://www.bbc.com/news/health-30943377.
[10]
Invensense. http://www.invensense.com/.
[11]
Is it acceptable to wear a watch on the right wrist? http://www.askandyaboutclothes.com/forum/showthread.php?116570-Is-it-acceptable-to-wear-a-watch-on-the-right-wrist.
[12]
Learn how to touch type. http://www.ratatype.com/learn/.
[13]
A new wave of gadgets can collect your personal information like never before. http://www.businessinsider.com.au/privacy-fitness-trackers-smartwatches-2014--10.
[14]
Personal identification number. https://en.wikipedia.org/wiki/Personal_identification_number.
[15]
Poor water and hygiene 'kills mothers and newborns'. http://www.bbc.com/news/health-30452226.
[16]
Pos terminals e530 pos. http://landicorp.en.frbiz.com/group-pos_systems/34719013-pos_terminals_e530_pos.html.
[17]
Watch handedness. https://en.wikipedia.org/wiki/Watch#Handedness.
[18]
why wear a watch on the wrist where you're hand dominant http://www.reddit.com/r/Watches/comments/1wzub5/question_why_wear_a_watch_on_the_wrist_where/.
[19]
Annett, M. Handedness and brain asymmetry: The right shift theory. Psychology Press, 2002.
[20]
Asonov, D., and Agrawal, R. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy (2004), IEEE Computer Society.
[21]
Backes, M., Chen, T., Duermuth, M., Lensch, H., and Welk, M. Tempest in a teapot: Compromising reflections revisited. In Security and Privacy, 2009 30th IEEE Symposium on (2009), IEEE, pp. 315--327.
[22]
Backes, M., Durmuth, M., and Unruh, D. Compromising reflections-or-how to read lcd monitors around the corner. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (2008), IEEE, pp. 158--169.
[23]
Berger, Y., Wool, A., and Yeredor, A. Dictionary attacks using keyboard acoustic emanations. In Proceedings of the 13th ACM conference on Computer and communications security (2006), ACM, pp. 245--254.
[24]
Bianchi-Berthouze, N. Understanding the role of body movement in player engagement. Human-Computer Interaction 28, 1 (2013), 40--75.
[25]
Electronics, L. Lg g watch | powered by android wear. http://www.lg.com/global/gwatch/one/index.html#main, 2015.
[26]
Fothergill, S., Mentis, H., Kohli, P., and Nowozin, S. Instructing people for training gestural interactive systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2012), ACM, pp. 1737--1746.
[27]
Friedman, N., Rowe, J. B., Reinkensmeyer, D. J., and Bachman, M. The manumeter: A wearable device for monitoring daily use of the wrist and fingers.
[28]
Kwon, D. Y., and Gross, M. A framework for 3d spatial gesture design and modeling using a wearable input device. In Wearable Computers, 2007 11th IEEE International Symposium on (2007), IEEE, pp. 23--26.
[29]
Li, Z., Feng, Z., and Tygar, J. Keyboard acoustic emanations revisited. In Proceedings of the 12th ACM Conference on Computer and Communications Security (2005).
[30]
Liang, C., and Chen, H. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In 6th USENIX Conference on Hot Topics in Security, HotSec (2011).
[31]
Luinge, H. J., and Veltink, P. H. Measuring orientation of human body segments using miniature gyroscopes and accelerometers. Medical and Biological Engineering and computing 43, 2 (2005), 273--282.
[32]
Marquardt, P., Verma, A., Carter, H., and Traynor, P. (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM conference on Computer and communications security (2011), ACM, pp. 551--562.
[33]
Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choudhury, R. R. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services (2012), ACM, pp. 323--336.
[34]
Owusu, E., Han, J., Das, S., Perrig, A., and Zhang, J. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (2012), ACM, p. 9.
[35]
Raguram, R., White, A. M., Goswami, D., Monrose, F., and Frahm, J.-M. ispy: automatic reconstruction of typed input from compromising reflections. In Proceedings of the 18th ACM conference on Computer and communications security (2011), ACM, pp. 527--536.
[36]
Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., and Wang, H. J. World-driven access control for continuous sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 1169--1181.
[37]
Shukla, D., Kumar, R., Serwadda, A., and Phoha, V. V. Beware, your hands reveal your secrets! In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 904--917.
[38]
Vuagnoux, M., and Pasini, S. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium (2009), pp. 1--16.
[39]
Xu, Y., Heinly, J., White, A. M., Monrose, F., and Frahm, J.-M. Seeing double: Reconstructing obscured typed input from repeated compromising reflections. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 1063--1074.
[40]
Xu, Z., Bai, K., and Zhu, S. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (2012), ACM, pp. 113--124.
[41]
Yue, Q., Ling, Z., Fu, X., Liu, B., Ren, K., and Zhao, W. Blind recognition of touched keys on mobile devices. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 1403--1414.
[42]
Zhu, T., Ma, Q., Zhang, S., and Liu, Y. Context-free attacks using keyboard acoustic emanations. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM.

Cited By

View all
  • (2024)Observations and Considerations for Implementing Vibration Signals as an Input Technique for Mobile DevicesMultimodal Technologies and Interaction10.3390/mti80900768:9(76)Online publication date: 2-Sep-2024
  • (2024)ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture AnalysisACM Transactions on Privacy and Security10.1145/3696418Online publication date: 23-Sep-2024
  • (2024)MuKI-Fi: Multi-Person Keystroke Inference With BFI-Enabled Wi-Fi SensingIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833923:10(9835-9850)Online publication date: Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
October 2015
1750 pages
ISBN:9781450338325
DOI:10.1145/2810103
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. keystroke inference
  2. side-channel attacks
  3. smartwatch

Qualifiers

  • Research-article

Funding Sources

Conference

CCS'15
Sponsor:

Acceptance Rates

CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)82
  • Downloads (Last 6 weeks)8
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Observations and Considerations for Implementing Vibration Signals as an Input Technique for Mobile DevicesMultimodal Technologies and Interaction10.3390/mti80900768:9(76)Online publication date: 2-Sep-2024
  • (2024)ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture AnalysisACM Transactions on Privacy and Security10.1145/3696418Online publication date: 23-Sep-2024
  • (2024)MuKI-Fi: Multi-Person Keystroke Inference With BFI-Enabled Wi-Fi SensingIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833923:10(9835-9850)Online publication date: Oct-2024
  • (2024)Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3277287(1-18)Online publication date: 2024
  • (2024)Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10579997(2571-2576)Online publication date: 8-May-2024
  • (2024)Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and EvaluationInformation Security Applications10.1007/978-981-99-8024-6_13(159-174)Online publication date: 11-Jan-2024
  • (2023)Auditory eyesightProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620248(175-192)Online publication date: 9-Aug-2023
  • (2023)Going through the motionsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620247(159-174)Online publication date: 9-Aug-2023
  • (2023)Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke EavesdroppingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623088(239-252)Online publication date: 15-Nov-2023
  • (2023)Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With UltrasoundIEEE/ACM Transactions on Networking10.1109/TNET.2022.320515131:3(1026-1041)Online publication date: Jun-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media