MoLe: Motion Leaks through Smartwatch Sensors

被引:140
作者
Wang, He [1 ]
Lai, Ted Tsung-Te [1 ]
Choudhury, Romit Roy [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
来源
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING | 2015年
关键词
motion leaks; smartwatch; side-channel attacks; accelerometer; gyroscope; security; malware; Bayesian inference; gesture;
D O I
10.1145/2789168.2790121
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Imagine a user typing on a laptop keyboard while wearing a smart watch. This paper asks whether motion sensors from the watch can leak information about what the user is typing. While its not surprising that some information will be leaked, the question is how much? We find that when motion signal processing is combined with patterns in English language, the leakage is substantial. Reported results show that when a user types a word W, it is possible to shortlist a median of 24 words, such that W is in this shortlist. When the word is longer than 6 characters, the median shortlist drops to 10. Of course, such leaks happen without requiring any training from the user, and also under the (obvious) condition that the watch is only on the left hand. We believe this is surprising and merits awareness, especially in light of various continuous sensing apps that are emerging in the app market. Moreover, we discover additional "leaks" that can further reduce the shortlist - we leave these exploitations to future work.
引用
收藏
页码:155 / 166
页数:12
相关论文
共 18 条
  • [1] Agrawal S., 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, P15, DOI DOI 10.1145/1999995.1999998
  • [2] [Anonymous], 2001, P 10 C USENIX SEC S
  • [3] Asonov D, 2004, P IEEE S SECUR PRIV, P3
  • [4] Cai L., 2011, HOTSEC, V11, P9
  • [5] Cai Liang., 2012, Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, P273, DOI [10.1007/978-3-642-30921-2_16, DOI 10.1007/978-3-642-30921-216]
  • [6] Comparing Anomaly-Detection Algorithms for Keystroke Dynamics
    Killourhy, Kevin S.
    Maxion, Roy A.
    [J]. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 125 - 134
  • [7] Kune DF, 2010, PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), P678
  • [8] Li Zhuang, 2009, ACM T INFORM SYST SE, V13
  • [9] Jingen Liu, 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), P1996, DOI [10.1109/ICINIS.2009.13, 10.1109/CVPRW.2009.5206744]
  • [10] Marquardt P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P551