Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors

被引:1
作者
Nerini, Matteo [1 ]
Favarelli, Elia [2 ]
Chiani, Marco [2 ]
机构
[1] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[2] Univ Bologna, DEI CNIT, I-40136 Bologna, Italy
关键词
Cyber security; machine learning (ML); motion sensors; personal identification number (PIN); smartphone PIN attacks; AUTHENTICATION;
D O I
10.1109/ACCESS.2023.3253288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motion sensors are integrated into all mobile devices, providing useful information for a variety of purposes. However, these sensor data can be read by any application and website accessed through a browser, without requiring security permissions. In this paper, we show that information about smartphone movements can lead to the identification of a Personal Identification Number (PIN) typed by the user. To reduce the amount of sniffed data, we use an event-driven approach, where motion sensors are sampled only when a key is pressed. The acquired data are used to train a Machine Learning (ML) algorithm for the classification of the keystrokes in a supervised manner. We also consider that users insert the same PIN each time authentication is required, leading to further side-channel information available to the attacker. Numerical results show the feasibility of PIN cyber-attacks based on motion sensors, with no restrictions on the PIN length and on the possible digit combinations. For example, 4-digit PINs are correctly recognized at the first attempt with an accuracy of 37%, and in five attempts with an accuracy of 63%.
引用
收藏
页码:23008 / 23018
页数:11
相关论文
共 55 条
[1]   Poster Abstract: User Authentication using Wrist Mounted Inertial Sensors [J].
Mondol, Md Abu Sayeed ;
Emi, Ifat Afrin ;
Preum, Sarah Masud ;
Stankovic, John A. .
2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017, :309-310
[2]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[3]   Improving support vector machine classifiers by modifying kernel functions [J].
Amari, S ;
Wu, S .
NEURAL NETWORKS, 1999, 12 (06) :783-789
[4]  
Aviv AJ, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P41
[5]  
Ayotte Blaine, 2020, IEEE Transactions on Biometrics, Behavior, and Identity Science, V2, P377, DOI [10.1109/tbiom.2020.3003988, 10.1109/TBIOM.2020.3003988]
[6]  
Bishop Christopher M., 2006, Pattern recognition and machine learning, DOI [10.1007/978-0-387-45528-0, DOI 10.1007/978-0-387-45528-0]
[7]  
Bo C., 2013, P INT C MOBILE COMPU, P187, DOI DOI 10.1145/2500423.2504572
[8]  
Borui Li, 2020, IEEE Transactions on Biometrics, Behavior, and Identity Science, V2, P294, DOI [10.1109/tbiom.2020.2997004, 10.1109/TBIOM.2020.2997004]
[9]  
Bours P., 2014, PROC 2 INT WORKSHOP, P1, DOI 10.1109/IWBF.2014.6914254
[10]  
Cai L, 2011, P 6 USENIX C HOT TOP, V2011, P9