Reconstructing What You Said: Text Inference Using Smartphone Motion

被引:6
作者
Hodges, Duncan [1 ]
Buckley, Oliver [2 ]
机构
[1] Univ East Anglia, Sch Comp Sci, Norwich NR4 7TJ, Norfolk, England
[2] Cranfield Univ, Def Acad United Kingdom, Ctr Elect Warfare Informat & Cyber, Swindon SN6 8LA, Wilts, England
关键词
Computer security; computer hacking; keyboards; sensors;
D O I
10.1109/TMC.2018.2850313
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones and tablets are becoming ubiquitous within our connected lives and as a result these devices are increasingly being used for more and more Smartphones and tablets are becoming ubiquitous within our connected lives and as a result these devices are increasingly being used for more and more sensitive applications, such as banking. The security of the information within these sensitive applications is managed through a variety of different processes, all of which minimise the exposure of this sensitive information to other potentially malicious applications. This paper documents experiments with the 'zero-permission' motion sensors on the device as a side-channel for inferring the text typed into a sensitive application. These sensors are freely accessible without the phone user having to give permission. The research was able to, on average, identify nearly 30 percent of typed bigrams from unseen words, using a very small volume of training data, which was less than the size of a tweet. Given the natural redundancy in language this performance is often enough to understand the phrase being typed. We found that large devices were typically more vulnerable, as were users who held the device in one hand whilst typing with fingers. Of those bigrams which were not correctly identified over 60 percent of the errors involved the space bar and nearly half of the errors are within two keys on the keyboard.
引用
收藏
页码:947 / 959
页数:13
相关论文
共 46 条
  • [1] [Anonymous], 2016, 2016230 CRYPT EPRINT
  • [2] [Anonymous], 2015, SMARTPH DIFF
  • [3] [Anonymous], 2011, HOTSEC
  • [4] Aviv AJ, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P41
  • [5] Berndt D.J., 1994, Advances in Knowledge Discovery and Data Mining, P359
  • [6] Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures
    Bevan, Chris
    Fraser, Danae Stanton
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2016, 88 : 51 - 61
  • [7] Keystroke Inference Using Smartphone Kinematics
    Buckley, Oliver
    Hodges, Duncan
    Hadgkiss, Melissa
    Morris, Sarah
    [J]. HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 226 - 238
  • [8] The reliability of user authentication through keystroke dynamics
    Douhou, Salima
    Magnus, Jan R.
    [J]. STATISTICA NEERLANDICA, 2009, 63 (04) : 432 - 449
  • [9] Dvorak A., 1936, TYPEWRITING BEHAV
  • [10] Understanding Android Security
    Enck, William
    Ongtang, Machigair
    McDaniel, Patrick
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 50 - 57