Stealing PINs via mobile sensors

Slides:



Advertisements
Similar presentations
Mobile Application Architectures
Advertisements

Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
Presented by Zeehasham Rasheed
Creating Web Page Forms
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Mobile Sensor Application Group 4. Introduction Modern smartphones are often equipped with quite a large number of sensors. The sensors data can be used.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
TEMPLATE DESIGN © Detecting User Activities Using the Accelerometer on Android Smartphones Sauvik Das, Supervisor: Adrian.
Presented by: Tom Staley. Introduction Rising security concerns in the smartphone app community Use of private data: Passwords Financial records GPS locations.
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion Liang Cai and Hao Chen UC Davis.
Kumar Srijan ( ) Syed Ahsan( ). Problem Statement To create a Neural Networks based multiclass object classifier which can do rotation,
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
DImpack By Chau Ngo EEL 6788 Spring Outline Problem Statement/Motivation Software Overview Demo Technical Difficulties Lessons Learned Improvements.
TapPrints: Your Finger Taps Have Fingerprints Emiliano Miluzzo*, Alex Varshavsky*, Suhrid Balakrishnan*, Romit R. Choudhury + * at&t Labs – Research, USA.
TOUCHSIGNATURES Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Newcastle University CryptoForma meeting, Belfast 4 May 2015.
Human Activity Recognition Using Accelerometer on Smartphones
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
Indoor Location Detection By Arezou Pourmir ECE 539 project Instructor: Professor Yu Hen Hu.
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Srinivas Cheekati( ) Instructor: Dr. Dong-Chul Kim
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
IPS Infrastructure Technological Overview of Work Done.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Deep Belief Network Training Same greedy layer-wise approach First train lowest RBM (h 0 – h 1 ) using RBM update algorithm (note h 0 is x) Freeze weights.
Kim HS Introduction considering that the amount of MRI data to analyze in present-day clinical trials is often on the order of hundreds or.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Deep Learning Overview Sources: workshop-tutorial-final.pdf
 Using Touchloggers To Build User Profiles Through Machine Learning Craig Dezangle.
INTRODUCING HYBRID APP KAU with MICT PARK IT COMPANIES Supported by KOICA
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
111 State Management Beginning ASP.NET in C# and VB Chapter 4 Pages
Group 3 CMPE Community Project. What is CMPE Community project? CMPE Community project aims to create a social web application to create an environment,
Brief Look InTo JavaScript Dr. Thomas Hicks Computer Science Department Trinity University.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Android’s Malware Attack, Stealthiness and Defense: An Improvement Mohammad Ali, Humayun Ali and Zahid Anwar 2011 Frontiers of Information Technology.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
Ensemble Classifiers.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
Understanding Android Security
Deep Feedforward Networks
Honeypot in Mobile Network Security
Klara Nahrstedt Spring 2009
Information Technology Deanship
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
ARTIFICIAL NEURAL NETWORKS
Mobile Navigation Control for Planetary Web Portals Team Members: John Calilung, Miguel Martinez, Frank Navarrete, Kevin Parton, Max Ru, Catherine Suh.
Materials and Methods (Continued)
CHAPTER 3 Architectures for Distributed Systems
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
How to register and use ODMAP for Fire/EMS and other partners
Vijay Srinivasan Thomas Phan
Internet of Things Vulnerabilities
Activity Recognition Classification in Action
Android Topics Sensors Accelerometer and the Coordinate System
Teaching slides Chapter 6.
Parametric Methods Berlin Chen, 2005 References:
Understanding Android Security
PHP Forms and Databases.
Brief Look InTo JavaScript
A Firmware Update Architecture for Internet of Things Devices
Mole: Motion Leaks through Smartwatch Sensors
Affordable ways of getting good features in a website.
Presentation transcript:

Stealing PINs via mobile sensors Anjana Guruprasad Neerad Somanchi

Introduction Smartphones equipped with many different sensors such as GPS, light, orientation, and motion. Developers can have access to the mobile sensors by using standard APIs provided by the W3C which are accessible through JavaScript code within a mobile browser. Advantages : no in app-store approval needed and JavaScript code is platform independent. In-browser access risks Unlike in-app attacks, an in-browser attack, i.e., via JavaScript code embedded in a web page, does not require any app installation. It does not require any user permission to access sensor data such as device motion and orientation. However, an effective in-browser attack still has to overcome the technical challenge that the sampling rates available in browser are much lower than those in app.

User activities Sensitive user information such as phone calls timing and physical activities can be deduced from device orientation and motion sensor data obtained Motion and orientation sensor data are a series of different measurements as follows: device orientation which provides the physical orientation of the device, expressed as three rotation angles (α, β, γ ) device acceleration which provides the physical acceleration of the device, expressed in Cartesian coordinates (x, y, z) device acceleration including gravity device rotation rate which provides the rotation rate of the device about the local coordinate frame, expressed as three rotation angles (α, β, γ ) interval which provides the constant sampling rate and is expressed in milliseconds (ms) Moreover, the sensor data discussed above are processed sensor data obtained from multiple physical sensors such as gyroscope and accelerometer.

In-browser attacks Mobile operating systems and browsers do not implement consistent access control policies in regard to mobile orientation and motion sensor data. W3C specifications do not specify any policy or risks. Also, because of the low sampling rates available in browser, the community have been neglecting the security risks associated with in-browser access to such sensor data.

Phone calls timing

Physical activities

PINlogger.js - Attack approach The user has loaded the malicious web content in the form of an iframe, or another tab while working with the mobile browser The attack code has already started listening to the sensor sequences from the user’s interaction with the phone. In order to uncover when the user enters his PIN, we need to classify his touch actions such as click, scroll, and zoom. Our attacker already knows that the user is entering his PIN. We have a one-round training phase with data from multiple voluntary users and use the obtained trained algorithm to output other users’ PINs later

PINlogger.js - Web program implementation Web page with embedded JavaScript code in order to collect data from voluntary users The event handlers defined for these purposes are named DeviceOrientation-Event and DeviceMotionEvent Implemented server program using Node.js (nodejs.org) Our code sends the orientation and motion sensor data of the mobile device to our NoSQL database using MongoLab When the event listener fires, it establishes a socket by using Socket.IO (socket.io) between the client and the server and constantly transmits the sensor data to the database In the POC implementation of the attack, we focus on working with active web pages, which allows us to easily identify the start of a touch action through the JavaScript access to the onkeydown event

PINlogger.js - Data collection Considered a set of 50 fixed PINs with uniformly distributed digits. Created these PINs in a way that all digits are repeated about the same time (around 20 times). We conducted our user studies using Chrome on an Android device (Nexus 5). The experiments and results are based on the collected data from 10 users, each entering all the 50 4-digit PINs for 5 times

PINlogger.js - Feature extraction In order to build the feature vector as the input to our classifier algorithm, we consider both time-domain and frequency-domain features 12 different sequences obtained from the collected data include orientation (ori), acceleration (acc), acceleration including gravity (accG), and rotation rate (rotR) with three sequences (either x, y and z, or α, β and γ ) for each sensor measurement. In order to build our feature vector, first we obtain the maximum, minimum, and average values for time and frequency domain features. These statistical measurements give us 3 × 12 = 36 features in the time domain and the same number of features in the frequency domain. We also consider the total energy of each sequence in both time and frequency domains calculated as the sum of the squared sequence values, i.e., E = vi2 which gives us 24 new features. We consider pairwise correlation values between the 4 different sensors, done along each of the 3 axes. Gives us 18 new features. Therefore in total we have 114 features.

PINlogger.js - Neural network Applied a supervised machine learning algorithm by using an artificial neural network (ANN) to solve this classification problem As input, our ANN receives a set of 114 features for each sample. We collected 5 samples per each 4-digit PIN from 10 users. While reading the records, we realized that some of the PINs have been entered wrongly by some users The feature vectors are mapped to specific labels from a finite set: i.e., 50 fixed random 4-digit PINs. We train the network with 70% of our data, validate it with 15% of the records, and test it with the remaining 15% of our data set. We use a pattern recognition/classifying network in MATLAB with one hidden layer and 1000 nodes. Pattern recognition/classifying networks normally use a scaled conjugate gradient (SCG) back- propagation algorithm for updating weight and bias values in training.

Evaluation Multiple-users mode -As the table shows, in the first attempt PINlogger.js is able to infer the user’s 4-digit PIN correctly with accuracy of 74.43%, and as expected it gets better in further attempts. Same-user mode - As expected, our classifier performs better when it is personalized: the accuracy reaches 79.23% in the first attempt. Entire 4-digit PIN space vs Limited sample space

Possible solutions - Academic approach Restricting the sensor to one app Reducing the sampling rate Temporal pause of the sensor on sensitive entries such as keyboard Rearranging keyboard for password entrance Asking for explicit permission from the user Ranking apps based on their similarities to malware

Possible solutions - Industrial approach W3C Device Orientation Event Specification. There is no Security and Privacy section in the latest official W3C Working Draft Document on Device Orientation Event. The authors working on the revision of the W3C specification suggest the following: • “Do not fire events when the page where they were registered on is not visible or has been backgrounded.” • “Fire events only on the top-level browsing context or same-origin nested iframes.” • “Limit the frequency of events (typically 60 Hz seems to be sufficient).” These measures may be too restrictive in blocking useful functionalities. For example, a user consciously running a web program in the browser to monitor his daily physical activities such as walking and running.

Conclusion Access to mobile sensor data via JavaScript is limited to only a few sensors at the moment. This will probably expand in the future, specially with the rapid development of sensor enabled devices in the Internet of things (IoT). A combination of different approaches might help researchers devise a usable and secure solution. Having control on granting access before opening a website and during working with it, in combination with a smart notification feature in the browser would probably achieve a balance between security and usability. Users should also have control on reviewing, updating and deleting these data, if stored by the website or shared with a third party afterwards

References Stealing PINs via mobile sensors: actual risk versus user perception - Maryam Mehrnezhad · Ehsan Toreini · Siamak F. Shahandashti · Feng Hao, Int. Journal of Information Security, 2017