skip to main content
10.1145/3211960.3211973acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study

Published:10 June 2018Publication History

ABSTRACT

Many modern wrist-wearables, such as smartwatches and fitness trackers, are equipped with ambient light sensors that are able to capture the surrounding light levels. While an ambient light sensor is intended to make applications environment-aware, malicious applications can potentially misuse it to infer private information pertaining the wearer. Moreover, such an attack vector is hard to mitigate because the ambient light sensor is a part of the zero-permission sensor suite on most wearable platforms, i.e., any on-device application can access these sensors without requiring explicit user-level permissions. In this paper, we study the feasibility of how a malicious smartwatch application can leverage on ambient light sensor data to infer sensitive information about the wearer, specifically keystrokes typed by the wearer on an ATM keypad. While there are multiple previous works that target motion sensor data on wrist-wearables to infer keystrokes, we study the feasibility of how a similar attack can be conducted using an ambient light sensor. The characteristic differences between motion and light data, and how they are impacted during the keystroke activity, implies that existing inference frameworks that rely on motion data cannot be directly employed in this case. As a result, we design a new ambient light based keystroke inference framework which models the varying intensities of light on and around an ATM keypad to infer keystrokes. Our evaluation results indicate that an inference attack on keystrokes is moderately feasible, even with a coarse-grained ambient light sensor found on many low-cost wrist-wearables.

References

  1. D. Asonov and R. Agrawal. Keyboard Acoustic Emanations. In IEEE S&P, 2004.Google ScholarGoogle Scholar
  2. A. Barisani and D. Bianco. Sniffing Keystrokes with Lasers/Voltmeters. Black Hat USA, 2009.Google ScholarGoogle Scholar
  3. Y. Berger, A. Wool, and A. Yeredor. Dictionary Attacks using Keyboard Acoustic Emanations. In ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Consumer Technology Association. Smartwatch unit sales worldwide from 2014 to 2018 (in millions), 2018.Google ScholarGoogle Scholar
  5. A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In ACM SPSM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. G. Forder. The foundations of Euclidean geometry, volume 10. Dover New York, 1958.Google ScholarGoogle Scholar
  7. A. Holmes, S. Desai, and A. Nahapetian. Luxleak: capturing computing activity using smart device ambient light sensors. In ACM Smart Objects, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Krombholz, H. Hobel, M. Huber, and E. Weippl. Advanced social engineering attacks. Journal of Information Security and applications, 22, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang. When good becomes evil: Keystroke inference with smartwatch. In ACM CCS, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Maiti, O. Armbruster, M. Jadliwala, and J. He. Smartwatch-based keystroke inference attacks and context-aware protection mechanism. In ACM AsiaCCS, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Maiti, R. Heard, M. Sabra, and M. Jadliwala. Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel. In ACM WiSec, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic. (Smart)Watch Your Taps: Side-channel Keystroke Inference Attacks Using Smartwatches. In ACM ISWC, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic. Side-Channel Inference Attacks on Mobile Keypads using Smartwatches. IEEE Transactions of Mobile Computing, 2016.Google ScholarGoogle Scholar
  14. P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In ACM CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Michalevsky, D. Boneh, and G. Nakibly. Gyrophone: Recognizing Speech from Gyroscope Signals. In USENIX Security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, et al. Scikit-learn: Machine learning in python. Journal of machine learning research, 12(Oct), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Sarkisyan, R. Debbiny, and A. Nahapetian. Wristsnoop: Smartphone pins prediction using smartwatch motion sensors. In IEEE WIFS, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  18. R. Spreitzer. Pin skimming: Exploiting the ambient-light sensor in mobile devices. In ACM SPSM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Vuagnoux and S. Pasini. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Wang, T. T.-T. Lai, and R. Roy Choudhury. Mole: Motion leaks through smartwatch sensors. In ACM MobiCom, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    WearSys '18: Proceedings of the 4th ACM Workshop on Wearable Systems and Applications
    June 2018
    64 pages
    ISBN:9781450358422
    DOI:10.1145/3211960

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 June 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate28of36submissions,78%

    Upcoming Conference

    MOBISYS '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader