Poster: TapSnoop -- Inferring Tapstrokes from Listening to Tap Sound on Mobile Devices

Hyosu Kim, Daehyeok Kim, Byunggill Joe, Yunxin Liu, I. Shin
{"title":"Poster: TapSnoop -- Inferring Tapstrokes from Listening to Tap Sound on Mobile Devices","authors":"Hyosu Kim, Daehyeok Kim, Byunggill Joe, Yunxin Liu, I. Shin","doi":"10.1145/2938559.2938595","DOIUrl":null,"url":null,"abstract":"Mobile device users tap a touch-screen for entering sensitive information such as passwords and PIN numbers, and many works have proposed an attack model snooping such tapstrokes especially with the use of built-in sensors [1, 2, 3]. These studies raise the serious security concerns with the following attack scenario. A malicious application runs in the foreground as a normal chatting application, collecting a training set of sensor data generated from tapstrokes. While a user types her credit card number for purchasing something on a shopping application, it sneakingly takes sensor streams in the background and infers the tapped number by comparing the streams with the training data. However, in practice, the existing works have shown a limited inference accuracy, due to the following reasons. First, the intensity of tapstrokes is typically much low, resulting in a subtle change on sensor data. Second, mobile devices generally come with small on-screen keyboards where keys are very close to each other. Thus, it is essential to perform fine-grained tapstroke localization. Third, each mobile device has its own hardware characteristics with regard to screen’s size and thickness, as well as built-in sensor’s sensitivity. This inherently leads to different characteristics of tapstrokes for different devices. Last, smartphone users can use their devices in various places with different noise levels, while moving around. Therefore, it should be able to infer tapstrokes robustly against the environmental changes.","PeriodicalId":298684,"journal":{"name":"MobiSys '16 Companion","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MobiSys '16 Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2938559.2938595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Mobile device users tap a touch-screen for entering sensitive information such as passwords and PIN numbers, and many works have proposed an attack model snooping such tapstrokes especially with the use of built-in sensors [1, 2, 3]. These studies raise the serious security concerns with the following attack scenario. A malicious application runs in the foreground as a normal chatting application, collecting a training set of sensor data generated from tapstrokes. While a user types her credit card number for purchasing something on a shopping application, it sneakingly takes sensor streams in the background and infers the tapped number by comparing the streams with the training data. However, in practice, the existing works have shown a limited inference accuracy, due to the following reasons. First, the intensity of tapstrokes is typically much low, resulting in a subtle change on sensor data. Second, mobile devices generally come with small on-screen keyboards where keys are very close to each other. Thus, it is essential to perform fine-grained tapstroke localization. Third, each mobile device has its own hardware characteristics with regard to screen’s size and thickness, as well as built-in sensor’s sensitivity. This inherently leads to different characteristics of tapstrokes for different devices. Last, smartphone users can use their devices in various places with different noise levels, while moving around. Therefore, it should be able to infer tapstrokes robustly against the environmental changes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
海报:TapSnoop——通过聆听移动设备上的点击声音来推断点击次数
移动设备用户通过点击触摸屏输入密码和PIN码等敏感信息,许多研究提出了一种窥探此类点击的攻击模型,特别是使用内置传感器[1,2,3]。这些研究提出了以下攻击场景的严重安全问题。恶意应用程序在前台作为正常聊天应用程序运行,收集从点击产生的传感器数据的训练集。当用户在购物应用程序上输入她的信用卡号码购买东西时,它会在后台偷偷地获取传感器数据流,并通过将数据流与训练数据进行比较来推断被点击的数字。然而,在实践中,由于以下原因,现有的工作显示出有限的推理精度。首先,敲击的强度通常很低,导致传感器数据的微妙变化。其次,移动设备通常带有小屏幕键盘,其中按键彼此非常接近。因此,执行细粒度敲击行程定位是必要的。第三,每个移动设备都有自己的硬件特点,屏幕的大小和厚度,以及内置传感器的灵敏度。这必然导致不同设备的敲击敲击的不同特性。最后,智能手机用户可以在各种噪音水平不同的地方使用他们的设备,同时四处走动。因此,它应该能够根据环境变化强有力地推断敲击动作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Demo: Profiling Power Utilization Behaviours of Smartwatch Applications Poster: Index Structure for Spatial Keyword Query with Myanmar Language on the Mobile Devices Poster: Software Architecture for Efficiently Designing Cloud Applications using Node.js Poster: Discovery of Disappeared Node in Large Number of BLE Devices Environment Poster: Deep Learning Enabled M2M Gateway for Network Optimization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1