skip to main content
10.1145/3607199.3607203acmotherconferencesArticle/Chapter ViewAbstractPublication PagesraidConference Proceedingsconference-collections
research-article

Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors

Published:16 October 2023Publication History

ABSTRACT

Smartphone motion sensors provide cybersecurity attackers with a stealthy way to eavesdrop on nearby acoustic information. Eavesdropping on touchtones emitted by smartphone speakers when users input numbers into their phones exposes sensitive information such as credit card information, banking PINs, and social security card numbers to malicious applications with access to only motion sensor data. This work characterizes this new security threat of touchtone eavesdropping by providing an analysis based on physics and signal processing theory. We show that advanced adversaries who selectively integrate data from multiple motion sensors and multiple sensor axes can achieve over 99% accuracy on recognizing 12 unique touchtones. We further design, analyze, and evaluate several mitigations which could be implemented in a smartphone update. We found that some apparent mitigations such as low-pass filters can undesirably reduce the motion sensor data to benign applications by 83% but only reduce an advanced adversary’s accuracy by less than one percent. Other more informed designs such as anti-aliasing filters can fully preserve the motion sensor data to support benign application functionality while reducing attack accuracy by 50.1%.

References

  1. S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2019. Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. arXiv preprint arXiv:1907.05972 (2019).Google ScholarGoogle Scholar
  2. Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.. In NDSS.Google ScholarGoogle Scholar
  3. Stephen Beeby, Graham Ensel, Neil M White, and Michael Kraft. 2004. MEMS mechanical sensors. Artech House.Google ScholarGoogle Scholar
  4. Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).Google ScholarGoogle Scholar
  5. Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, and Kevin Fu. 2018. Blue Note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 1048–1062.Google ScholarGoogle ScholarCross RefCross Ref
  6. Raj Bridgelall. 2015. Inertial sensor sample rate selection for ride quality measures. Journal of Infrastructure Systems 21, 2 (2015), 04014039.Google ScholarGoogle ScholarCross RefCross Ref
  7. Tianqi Chen and Carlos Guestrin. 2016. XGBoost. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Aug 2016). https://doi.org/10.1145/2939672.2939785Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yun Chan Cho and Jae Wook Jeon. 2008. Remote robot control system based on DTMF of mobile phone. In 2008 6th IEEE International Conference on Industrial Informatics. IEEE, 1441–1446.Google ScholarGoogle Scholar
  9. Android Developers. 2023. Android Debug Bridge. https://developer.android.com/studio/command-line/adb.Google ScholarGoogle Scholar
  10. Denis Foo Kune, John Backes, Shane S Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the 34th IEEE Symposium on Security and Privacy (SP). IEEE, 145–159.Google ScholarGoogle Scholar
  11. Raffaele Gravina, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. 2017. Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges. Information Fusion 35 (2017), 68–80.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jun Han, Albert Jin Chung, and Patrick Tague. 2017. PitchIn: Eavesdropping via Intelligible Speech Reconstruction using Non-Acoustic Sensor Fusion. In 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jun Han, Emmanuel Owusu, Le T. Nguyen, Adrian Perrig, and Joy Zhang. 2012. ACComplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS). https://doi.org/10.1109/COMSNETS.2012.6151305Google ScholarGoogle ScholarCross RefCross Ref
  14. Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth Pathak, Guoming Zhang, and Xiuzhen Cheng. 2022. Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1757–1773.Google ScholarGoogle ScholarCross RefCross Ref
  15. Zhe Hu, Lu Yuan, Stephen Lin, and Ming-Hsuan Yang. 2016. Image deblurring using smartphone inertial sensors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1855–1864.Google ScholarGoogle ScholarCross RefCross Ref
  16. Intel. 2023. Intel NUC. https://www.intel.com/content/www/us/en/products/boards-kits/nuc.html.Google ScholarGoogle Scholar
  17. Alexandre Karpenko, David Jacobs, Jongmin Baek, and Marc Levoy. 2011. Digital video stabilization and rolling shutter correction using gyroscopes. CSTR 1, 2 (2011), 13.Google ScholarGoogle Scholar
  18. Adil Mehmood Khan, Muhammad Hameed Siddiqi, and Seok-Won Lee. 2013. Exploratory data analysis of acceleration signals to select light-weight and accurate features for real-time activity recognition on smartphones. Sensors 13, 10 (2013), 13099–13122.Google ScholarGoogle ScholarCross RefCross Ref
  19. Tuljappa M Ladwa, Sanjay M Ladwa, R Sudharshan Kaarthik, Alok Ranjan Dhara, and Nayan Dalei. 2009. Control of remote domestic system using DTMF. In International Conference on Instrumentation, Communication, Information Technology, and Biomedical Engineering 2009. IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  20. Seoungjun Lee, Dongsoo Har, and Dongsuk Kum. 2016. Drone-assisted disaster management: Finding victims via infrared camera and lidar sensor fusion. In 2016 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE). IEEE, 84–89.Google ScholarGoogle ScholarCross RefCross Ref
  21. R. Gary Leonard and George R. Doddington. 1993. TIDIGITS. https://catalog.ldc.upenn.edu/LDC93S10.Google ScholarGoogle Scholar
  22. Mark W Maciejewski, Harry Z Qui, Iulian Rujan, Mehdi Mobli, and Jeffrey C Hoch. 2009. Nonuniform sampling and spectral aliasing. Journal of Magnetic Resonance 199, 1 (2009), 88–93.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, and Nitesh Saxena. 2022. EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. arXiv preprint arXiv:2212.12151 (2022).Google ScholarGoogle Scholar
  24. Robert J. Marks, II. 1991. Introduction to Shannon Sampling and Interpolation Theory. Springer-Verlag, Berlin, Heidelberg.Google ScholarGoogle Scholar
  25. Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (Sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In Conference on Computer and Communications Security (CCS). ACM, New York, NY, USA. https://doi.org/10.1145/2046707.2046771Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Václav Matyáš and Zdeněk Říha. 2002. Biometric authentication—security and usability. In Advanced communications and multimedia security. Springer, 227–239.Google ScholarGoogle Scholar
  27. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1053–1067. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevskyGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  28. Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. 2012. Tapprints: Your Finger Taps Have Fingerprints. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (Low Wood Bay, Lake District, UK) (MobiSys ’12). ACM, New York, NY, USA, 323–336. https://doi.org/10.1145/2307636.2307666Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Narain, T. D. Vo-Huu, K. Block, and G. Noubir. 2016. Inferring User Routes and Locations Using Zero-Permission Mobile Sensors. In 2016 IEEE Symposium on Security and Privacy (SP). 397–413. https://doi.org/10.1109/SP.2016.31Google ScholarGoogle ScholarCross RefCross Ref
  30. Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. 2012. ACCessory: Password Inference Using Accelerometers on Smartphones(HotMobile). ACM, New York, NY, USA. https://doi.org/10.1145/2162081.2162095Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Thilo Pfau and Patrick Reilly. 2021. How low can we go? Influence of sample rate on equine pelvic displacement calculated from inertial sensor data. Equine Veterinary Journal 53, 5 (2021), 1075–1081.Google ScholarGoogle ScholarCross RefCross Ref
  32. Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. 2012. Plagiarizing smartphone applications: attack strategies and defense techniques. In International symposium on engineering secure software and systems. Springer, 106–120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C.E. Shannon. 1949. Communication in the Presence of Noise. Proceedings of the IRE 37, 1 (Jan 1949), 10–21. https://doi.org/10.1109/JRPROC.1949.232969Google ScholarGoogle ScholarCross RefCross Ref
  34. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium. 881–896.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Weigao Su, Daibo Liu, Taiyuan Zhang, and Hongbo Jiang. 2021. Towards device independent eavesdropping on telephone conversations with built-in accelerometer. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 4 (2021), 1–29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. General Tools. 2023. DSM403SD. https://generaltools.com/class-1-sound-level-meter-with-excel-formatted-data-logging-sd-card.Google ScholarGoogle Scholar
  37. Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 3–18.Google ScholarGoogle ScholarCross RefCross Ref
  38. Yannis Tsividis. 2004. Digital signal processing in continuous time: a possibility for avoiding aliasing and reducing quantization error. In 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 2. IEEE, ii–589.Google ScholarGoogle ScholarCross RefCross Ref
  39. Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In 27th USENIX Security Symposium. 1545–1562.Google ScholarGoogle Scholar
  40. International Telecommunication Union. 1988. Technical Features of Push-Button Telephone Sets. General Recommendations on Telephone Switching and Signalling (25 11 1988). https://www.itu.int/rec/T-REC-Q.23-198811-I/en.Google ScholarGoogle Scholar
  41. Matt Vasilogambros. 2019. Voting by phone is easy. But is it secure?https://gcn.com/articles/2019/07/18/vote-by-phone.aspx.Google ScholarGoogle Scholar
  42. Alma Whitten and J Doug Tygar. 1999. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.. In USENIX security symposium, Vol. 348. 169–184.Google ScholarGoogle Scholar
  43. Steve Winder. 2002. Analog and digital filter design. Elsevier.Google ScholarGoogle Scholar
  44. Chen Yan, Yan Long, Xiaoyu Ji, and Wenyuan Xu. 2019. The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1215–1229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Li Zhang, Parth H. Pathak, Muchen Wu, Yixin Zhao, and Prasant Mohapatra. 2015. AccelWord: Energy Efficient Hotword Detection Through Accelerometer. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (Florence, Italy) (MobiSys ’15). ACM, New York, NY, USA, 301–315. https://doi.org/10.1145/2742647.2742658Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, and Xinwen Fu. 2012. Fingerprint attack against touch-enabled devices. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices. 57–68.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
      October 2023
      769 pages
      ISBN:9798400707650
      DOI:10.1145/3607199

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)131
      • Downloads (Last 6 weeks)19

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format