skip to main content
research-article

Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops

Published: 30 December 2021 Publication History

Abstract

The convenience of laptops brings with it the risk of information leakage, and conventional security systems based on the password or the explicit biometric do little to alleviate this problem. Biometric identification based on anatomical features provides far stronger security; however, a lack of suitable sensors on laptops limits the applicability of this technology. In this paper, we developed a behavior-irrelevant user identification system applicable to laptops with a metal casing. The proposed scheme, referred to as LeakPrint, is based on leakage current, wherein the system uses an earphone to capture current leaking through the body and then transmits the corresponding signal to a server for identification. The user identification is achieved via denoising, dimension reduction, and feature extraction. Compared to other biometric identification methods, the proposed system is less dependent on external hardware and more robust to environmental noise. The experiments in real-world environments demonstrated that LeakPrint can verify user identity with high accuracy (93.6%), while providing effective defense against replay attacks (96.5%) and mimicry attacks (90.9%).

References

[1]
A Ahlbom, U Bergqvist, JH Bernhardt, JP Cesarini, M Grandolfo, M Hietanen, AF Mckinlay, MH Repacholi, David H Sliney, J AJ Stolwijk, et al. 1998. Guidelines for limiting exposure to time-varying electric, magnetic, and electromagnetic fields (up to 300 GHz). Health physics 74, 4 (1998), 494--521.
[2]
P. Bontrager, A. Roy, J. Togelius, N. Memon, and A. Ross. 2018. DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). 1--9. https://doi.org/10.1109/BTAS.2018.8698539
[3]
Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, and Youngki Lee. 2017. BreathPrint: Breathing Acoustics-Based User Authentication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (Niagara Falls, New York, USA) (MobiSys '17). Association for Computing Machinery, New York, NY, USA, 278--291. https://doi.org/10.1145/3081333.3081355
[4]
Huijie Chen, Fan Li, Wan Du, Song Yang, Matthew Conn, and Yu Wang. 2020. Listen to Your Fingers: User Authentication Based on Geometry Biometrics of Touch Gesture. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 3, Article 75 (Sept. 2020), 23 pages. https://doi.org/10.1145/3411809
[5]
Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. 2021. User Authentication via Electrical Muscle Stimulation. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3411764.3445441
[6]
Jianqing Fan and Jinchi Lv. 2008. Sure independence screening for ultrahigh dimensional feature space. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 70, 5 (2008), 849--911. https://doi.org/10.1111/j.1467-9868.2008.00674.x arXiv:https://rss.onlinelibrary.wiley.com/doi/pdf/10.1111/j.1467-9868.2008.00674.x
[7]
Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2015. Local Contrast Phase Descriptor for Fingerprint Liveness Detection. Pattern Recogn. 48, 4 (April 2015), 1050--1058. https://doi.org/10.1016/j.patcog.2014.05.021
[8]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9]
Christian Holz and Marius Knaust. 2015. Biometric Touch Sensing: Seamlessly Augmenting Each Touch with Continuous Authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software amp; Technology (Charlotte, NC, USA) (UIST '15). Association for Computing Machinery, New York, NY, USA, 303--312. https://doi.org/10.1145/2807442.2807458
[10]
S. Kamath and P. Loizou. 2002. A multi-band spectral subtraction method for enhancing speech corrupted by colored noise. In 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 4. IV-4164-IV-4164. https://doi.org/10.1109/ICASSP.2002.5745591
[11]
Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Linghe Kong, and Minglu Li. 2019. FingerPass: Finger Gesture-Based Continuous User Authentication for Smart Homes Using Commodity WiFi. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing (Catania, Italy) (Mobihoc '19). Association for Computing Machinery, New York, NY, USA, 201--210. https://doi.org/10.1145/3323679.3326518
[12]
Colin Lea, Michael D. Flynn, Rene Vidal, Austin Reiter, and Gregory D. Hager. 2017. Temporal Convolutional Networks for Action Segmentation and Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13]
Runze Li, Wei Zhong, and Liping Zhu. 2012. Feature Screening via Distance Correlation Learning. J. Amer. Statist. Assoc. 107, 499 (2012), 1129--1139. https://doi.org/10.1080/01621459.2012.695654 arXiv:https://doi.org/10.1080/01621459.2012.695654 25249709.
[14]
Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac Scan: A Non-Contact and Continuous Heart-Based User Authentication System. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (Snowbird, Utah, USA) (MobiCom '17). Association for Computing Machinery, New York, NY, USA, 315--328. https://doi.org/10.1145/3117811.3117839
[15]
Jian Liu, Cong Shi, Yingying Chen, Hongbo Liu, and Marco Gruteser. 2019. CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (Seoul, Republic of Korea) (MobiSys '19). Association for Computing Machinery, New York, NY, USA, 249--261. https://doi.org/10.1145/3307334.3326093
[16]
G. Lovisotto, H. Turner, S. Eberz, and I. Martinovic. 2020. Seeing Red: PPG Biometrics Using Smartphone Cameras. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE Computer Society, Los Alamitos, CA, USA, 3565--3574. https://doi.org/10.1109/CVPRW50498.2020.00417
[17]
L. Lu, J. Yu, Y. Chen, H. Liu, Y. Zhu, Y. Liu, and M. Li. 2018. LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. 1466--1474. https://doi.org/10.1109/INFOCOM.2018.8486283
[18]
Li Lu, Jiadi Yu, Yingying Chen, and Yan Wang. 2020. VocalLock: Sensing Vocal Tract for Passphrase-Independent User Authentication Leveraging Acoustic Signals on Smartphones. 4, 2, Article 51 (June 2020), 24 pages. https://doi.org/10.1145/3397320
[19]
L. Lu, J. Yu, Y. Chen, Y. Zhu, X. Xu, G. Xue, and M. Li. 2019. KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 775--783. https://doi.org/10.1109/INFOCOM.2019.8737591
[20]
Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (Sp)IPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In Proceedings of the 18th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA) (CCS '11). Association for Computing Machinery, New York, NY, USA, 551--562. https://doi.org/10.1145/2046707.2046771
[21]
Ivan Martinovic, Kasper B. Rasmussen, Marc Roeschlin, and Gene Tsudik. 2017. Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. Acm Transaction on Information System Security 20, 2 (2017), 6.1-6.31.
[22]
Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, and Yang Xiang. 2018. TouchWB: Touch behavioral user authentication based on web browsing on smartphones. Journal of Network and Computer Applications 117 (2018), 1--9. https://doi.org/10.1016/j.jnca.2018.05.010
[23]
Viet Nguyen, Mohamed Ibrahim, Hoang Truong, Phuc Nguyen, Marco Gruteser, Richard Howard, and Tam Vu. 2018. Body-Guided Communications: A Low-Power, Highly-Confined Primitive to Track and Secure Every Touch. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (New Delhi, India) (MobiCom '18). Association for Computing Machinery, New York, NY, USA, 353--368. https://doi.org/10.1145/3241539.3241550
[24]
Jay Prakash, Zhijian Yang, Yu-Lin Wei, Haitham Hassanieh, and Romit Roy Choudhury. 2020. EarSense: Earphones as a Teeth Activity Sensor (MobiCom '20). Association for Computing Machinery, New York, NY, USA, Article 40, 13 pages. https://doi.org/10.1145/3372224.3419197
[25]
Charles R. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. 2017. PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation. arXiv:1612.00593 [cs.CV]
[26]
Aditya Singh Rathore, Weijin Zhu, Afee Daiyan, Chenhan Xu, Kun Wang, Feng Lin, Kui Ren, and Wenyao Xu. 2020. SonicPrint: A Generally Adoptable and Secure Fingerprint Biometrics in Smart Devices. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services (Toronto, Ontario, Canada) (MobiSys '20). Association for Computing Machinery, New York, NY, USA, 121--134. https://doi.org/10.1145/3386901.3388939
[27]
J Patrick Reilly. 2012. Applied bioelectricity: from electrical stimulation to electropathology. Springer Science & Business Media.
[28]
Stefan Schneegaß, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. 1379--1384. https://doi.org/10.1145/2858036.2858152
[29]
Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A Unified Embedding for Face Recognition and Clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[30]
Syed W. Shah and Salil S. Kanhere. 2019. Recent Trends in User Authentication - A Survey. IEEE Access 7 (2019), 112505--112519. https://doi.org/10.1109/ACCESS.2019.2932400
[31]
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Y. Zhao. 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1589--1604. https://www.usenix.org/conference/usenixsecurity20/presentation/shan
[32]
Zhihui Shao, Mohammad Islam, and Shaolei Ren. 2020. Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers? ACM SIGMETRICS Performance Evaluation Review 48 (07 2020), 79--80. https://doi.org/10.1145/3410048.3410094
[33]
C. Shen, Y. Chen, X. Guan, and R. A. Maxion. 2020. Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. IEEE Transactions on Dependable and Secure Computing 17, 2 (2020), 335--349. https://doi.org/10.1109/TDSC.2017.2771295
[34]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-Enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Chennai, India) (Mobihoc '17). Association for Computing Machinery, New York, NY, USA, Article 5, 10 pages. https://doi.org/10.1145/3084041.3084061
[35]
Gábor J. Székely, Maria L. Rizzo, and Nail K. Bakirov. 2007. Measuring and testing dependence by correlation of distances. Ann. Statist. 35, 6 (12 2007), 2769--2794. https://doi.org/10.1214/009053607000000505
[36]
Ting Guo, D. Y. Chen, and F. C. Lee. 1995. Diagnosis of power supply conducted EMI using a noise separator. In Proceedings of 1995 IEEE Applied Power Electronics Conference and Exposition - APEC'95, Vol. 1. 259--266 vol.1. https://doi.org/10.1109/APEC.1995.469028
[37]
Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9, 86 (2008), 2579--2605. http://jmlr.org/papers/v9/vandermaaten08a.html
[38]
Virag Varga, Gergely Vakulya, Alanson Sample, and Thomas R. Gross. 2018. Enabling Interactive Infrastructure with Body Channel Communication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4, Article 169 (Jan. 2018), 29 pages. https://doi.org/10.1145/3161180
[39]
Virag Varga, Marc Wyss, Gergely Vakulya, Alanson Sample, and Thomas R. Gross. 2018. Designing Groundless Body Channel Communication Systems: Performance and Implications. In Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology (Berlin, Germany) (UIST '18). Association for Computing Machinery, New York, NY, USA, 683--695. https://doi.org/10.1145/3242587.3242622
[40]
Edward Jay Wang, Jake Garrison, Eric Whitmire, Mayank Goel, and Shwetak Patel. 2017. Carpacio: Repurposing Capacitive Sensors to Distinguish Driver and Passenger Touches on In-Vehicle Screens (UIST '17). Association for Computing Machinery, New York, NY, USA, 49--55. https://doi.org/10.1145/3126594.3126623
[41]
Fei Wang, Zhenjiang Li, and Jinsong Han. 2019. Continuous User Authentication by Contactless Wireless Sensing. IEEE Internet of Things Journal 6, 5 (2019), 8323--8331. https://doi.org/10.1109/JIOT.2019.2916777
[42]
Wechat. 2015. Voiceprint: The New Wechat Password. https://blog.wechat.com/2015/05/21/voiceprint-the-new-wechat-password/
[43]
S. Westerlund and L. Ekstam. 1994. Capacitor theory. IEEE Transactions on Dielectrics and Electrical Insulation 1, 5 (1994), 826--839. https://doi.org/10.1109/94.326654
[44]
Wikipedia. 2021. Wikipedia Equal-loudness contour. https://en.wikipedia.org/wiki/Equal-loudness_contour
[45]
Xiao-Ping Zhang and M. D. Desai. 1998. Adaptive denoising based on SURE risk. IEEE Signal Processing Letters 5, 10 (1998), 265--267. https://doi.org/10.1109/97.720560
[46]
Xiaomi. 2021. https://www.mi.com/index.html
[47]
Xiangyu Xu, Jiadi Yu, Yingying chen, Qin Hua, Yanmin Zhu, Yi-Chao Chen, and Minglu Li. 2020. TouchPass: Towards Behavior-Irrelevant on-Touch User Authentication on Smartphones Leveraging Vibrations. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (London, United Kingdom) (MobiCom '20). Association for Computing Machinery, New York, NY, USA, Article 24, 13 pages. https://doi.org/10.1145/3372224.3380901
[48]
J. Yan, A. Blackwell, R. Anderson, and A. Grant. 2004. Password memorability and security: empirical results. IEEE Security Privacy 2, 5 (2004), 25--31. https://doi.org/10.1109/MSP.2004.81
[49]
Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In The 25th Annual International Conference on Mobile Computing and Networking (Los Cabos, Mexico) (MobiCom '19). Association for Computing Machinery, New York, NY, USA, Article 23, 16 pages. https://doi.org/10.1145/3300061.3300118
[50]
Chouchang Jack Yang and Alanson P. Sample. 2017. EM-Comm: Touch-Based Communication via Modulated Electromagnetic Emissions. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 118 (Sept. 2017), 24 pages. https://doi.org/10.1145/3130984
[51]
L. Yang, Y. C. Chen, H. Pan, D. Ding, G. Xue, L. Kong, J. Yu, and M. Li. 2020. MagPrint: Deep Learning Based User Fingerprinting Using Electromagnetic Signals. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. 696--705. https://doi.org/10.1109/INFOCOM41043.2020.9155534
[52]
Fisher Yu and Vladlen Koltun. 2016. Multi-Scale Context Aggregation by Dilated Convolutions. arXiv:1511.07122 [cs.CV]
[53]
Xiao Zeng, Kai Cao, and Mi Zhang. 2017. MobileDeepPill: A small-footprint mobile deep learning system for recognizing unconstrained pill images. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 56--67.
[54]
Emanuel Zezschwitz, Paul Dunphy, and Alexander De Luca. 2013. Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. 261--270. https://doi.org/10.1145/2493190.2493231
[55]
Linghan Zhang, Sheng Tan, and Jie Yang. 2017. Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 57--71. https://doi.org/10.1145/3133956.3133962
[56]
Yongzhao Zhang, Wei-Hsiang Huang, Chih-Yun Yang, Wen-Ping Wang, Yi-Chao Chen, Chuang-Wen You, Da-Yuan Huang, Guangtao Xue, and Jiadi Yu. 2020. Endophasia: Utilizing Acoustic-Based Imaging for Issuing Contact-Free Silent Speech Commands. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 1, Article 37 (March 2020), 26 pages.

Cited By

View all
  • (2024)Pioneering Cooperative Air-Ground Instant Delivery Using UAVs and Crowdsourced CouriersProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997228:4(1-26)Online publication date: 21-Nov-2024
  • (2024)Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic EmanationsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678917(660-673)Online publication date: 30-Sep-2024
  • (2024)Enable Touch-based Communication between Laptop and SmartwatchCompanion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/3675094.3677574(4-8)Online publication date: 5-Oct-2024
  • Show More Cited By

Index Terms

  1. Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 4
      Dec 2021
      1307 pages
      EISSN:2474-9567
      DOI:10.1145/3508492
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 December 2021
      Published in IMWUT Volume 5, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Laptop
      2. Leakage Current
      3. User Identification

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)48
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Pioneering Cooperative Air-Ground Instant Delivery Using UAVs and Crowdsourced CouriersProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997228:4(1-26)Online publication date: 21-Nov-2024
      • (2024)Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic EmanationsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678917(660-673)Online publication date: 30-Sep-2024
      • (2024)Enable Touch-based Communication between Laptop and SmartwatchCompanion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/3675094.3677574(4-8)Online publication date: 5-Oct-2024
      • (2024)DECO: Cooperative Order Dispatching for On-Demand Delivery with Real-Time Encounter DetectionProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3680084(4734-4742)Online publication date: 21-Oct-2024
      • (2023)LAUREATEProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36108927:3(1-41)Online publication date: 27-Sep-2023
      • (2023)GC-LocProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35694956:4(1-27)Online publication date: 11-Jan-2023
      • (2022)Sensing with EarablesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503146:3(1-57)Online publication date: 7-Sep-2022
      • (2022)Towards Fair Workload Assessment via Homogeneous Order Grouping in Last-mile DeliveryProceedings of the 31st ACM International Conference on Information & Knowledge Management10.1145/3511808.3557132(3361-3370)Online publication date: 17-Oct-2022

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media