AsiaCCS 2016 Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo.

Slides:



Advertisements
Similar presentations
Spelling Correction for Search Engine Queries Bruno Martins, Mario J. Silva In Proceedings of EsTAL-04, España for Natural Language Processing Presenter:
Advertisements

Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
TRADING OFF PREDICTION ACCURACY AND POWER CONSUMPTION FOR CONTEXT- AWARE WEARABLE COMPUTING Presented By: Jeff Khoshgozaran.
南台科技大學 資訊工程系 Posture Monitoring System for Context Awareness in Mobile Computing Authors: Jonghun Baek and Byoung-Ju Yun Adviser: Yu-Chiang Li Speaker:
Using Mobile Phones To Write In Air
TEMPLATE DESIGN © Detecting User Activities Using the Accelerometer on Android Smartphones Sauvik Das, Supervisor: Adrian.
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion Liang Cai and Hao Chen UC Davis.
Side Channel Attacks through Acoustic Emanations
Keystroke Recognition using WiFi Signals
Maryam Mehrnezhad Feng Hao Siamak F. Shahandashti Newcastle university, UK CryptoForma meeting, Belfast 4 May 2015 Tap-Tap and Pay (TTP): Preventing The.
James Pittman February 9, 2011 EEL 6788 MoVi: Mobile Phone based Video Highlights via Collaborative Sensing Xuan Bao Department of ECE Duke University.
Physics is the study of the behavior of matter and energy in the world around us. What is Physics?
Counting How Many Words You Read
Sensors in android. App being more applicable Keeping track of your heart beat while jogging. Pointing the phone camera towards the night sky to know.
Finding document topics for improving topic segmentation Source: ACL2007 Authors: Olivier Ferret (18 route du Panorama, BP6) Reporter:Yong-Xiang Chen.
Turning a Mobile Device into a Mouse in the Air
Sensors For Mobile Phones  Ambient Light Sensor  Proximity Sensor  GPS Receiver Sensor  Gyroscope Sensor  Barometer Sensor  Accelerometer Sensor.
The sensors guide fingerprint sensors rate monitor gyroscope camera
Mobile phone sensors. Sensors Sensors gyroscope The gyroscope is a sensor that can provide orientation information as well. This sensor can tell how.
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers By Chen Song, Feng Lin, Zongjie Ba, Kui Ren, Chi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
Module 10 Hypothesis Tests for One Population Mean
Automatic Writing Evaluation
AP Statistics Exam Review Topic #4
Mobile Activity Recognition
Free for All! Assessing User Data Exposure to Advertising Libraries on Android Campbell Foskin.
Amos Tanay Nir Yosef 1st HCA Jamboree, 8/2017
Lecture 1: Introduction and the Boolean Model Information Retrieval
ArmKeyBoard A Mobile Keyboard Instrument Based on Chord-scale System
Physical Changes That Don’t Change the Logical Design
What Is an Electric Motor? How Does a Rotation Sensor Work?
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
Bag-of-Visual-Words Based Feature Extraction
Different techniques used in photography.
Take-home quiz due! Get out materials for notes!
UNIT-III FEEDBACK DEVICES
Day 31 AGENDA: DG minutes Hand back THQ3.
Posture Monitoring System for Context Awareness in Mobile Computing
Variables, Expressions, and IO
Speed Sensor Calibration
Research design I: Experimental design and quasi-experimental research
Goal : Develop a software that converts arm movements into messages
Mobile Handset Sensors
Vijay Srinivasan Thomas Phan
A Framework for Automatic Resource and Accuracy Management in A Cloud Environment Smita Vijayakumar.
NBKeyboard: An Arm-based Word-gesture keyboard
CIS 527 Competitive Success/snaptutorial.com
CIS 527 Education for Service-- snaptutorial.com.
CIS 527 Teaching Effectively-- snaptutorial.com
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
Tremor Detection Using Motion Filtering and SVM Bilge Soran, Jenq-Neng Hwang, Linda Shapiro, ICPR, /16/2018.
DAISY Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
TEKNOLOGI MAKLUMAT DALAM PENDIDIKAN
How to Build Smart Appliances?
WearSys 2018 Keystroke Inference Using Ambient Light Sensor on Wrist-Wearables: A Feasibility Study Mohd Sabra, Anindya Maiti Murtuza Jadliwala Wichita.
Probabilistic Robotics
Anindya Maiti, Murtuza Jadliwala, Jibo He Igor Bilogrevic
iSRD Spam Review Detection with Imbalanced Data Distributions
Activity Recognition Classification in Action
Fundamentals of Python: First Programs
English Module G (016108/016582/407) Winter 2018.
Keystroke Recognition using Wi-Fi Signals
Synthesis of Motion from Simple Animations
Xin Qi, Matthew Keally, Gang Zhou, Yantao Li, Zhen Ren
Scatterplots Scatterplots may be the most common and most effective display for data. In a scatterplot, you can see patterns, trends, relationships, and.
Errors in survey measurements
Raveen Wijewickrama Anindya Maiti Murtuza Jadliwala
If you have your parent letter, please turn in at my desk (scissors on my desk). Get out your homework and materials for notes!
Mole: Motion Leaks through Smartwatch Sensors
Presentation transcript:

AsiaCCS 2016 Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He {axmaiti, oxarmbruster, murtuza.jadliwala, jibo.he}@wichita.edu

Keystrokes and Privacy We type more than ever before. It is important to protect from eavesdropping, because often the typed information is sensitive. Typing has become an integral part of our lives. But there’s always someone watching! Friday, February 22, 2019

Keystrokes and Privacy Credit Card Information Friday, February 22, 2019

Keystrokes and Privacy Tax Filing Friday, February 22, 2019

Keystrokes and Privacy Emails/Messages And so on… Friday, February 22, 2019

Wi-Fi Channel State Information Side-Channel Attacks Channel Type Common Limitation Berger et al. [CCS’06] Acoustic Change in position of either keyboard or eavesdropping device renders previous training data useless! Marquardt et al. [CCS’11] Surface Vibration Ali et al. [MobiCom’15] Wi-Fi Channel State Information For this talk let’s focus on eavesdropping attacks similar to our work, also know as side-channel attacks. They are called side-channel because the primary purpose of the eavesdropping device/sensor was not intended for eavesdropping. Friday, February 22, 2019

Day 1 The fundamental principle behind such attacks is that each key produces unique characteristics, for example, due to the distance from the eavesdropping device. Here, we look at Marquardt et al.’s setup using smartphone motion sensors to capture surface vibration. Keys near… Keys far…will produce different characteristics in surface vibration. Day 2 Friday, February 22, 2019

Smartwatches Wristwatch with functionality well beyond timekeeping. Miniaturized computer. Friday, February 22, 2019

Behind the Scenes Sensors Motion Microphone GPS Camera Ambient Light Temperature … Sensors such as GPS and camera are user manageable, not motion sensors. Friday, February 22, 2019

Problems We can’t turn off motion sensors. All applications have access to motion sensors by default. Permissions allows control of access to data directly sensed by the sensors, but not to information that can be inferred indirectly from the sensors! Smartwatch motions sensors are more difficult to manage than on smartphone. Similar to smartphones motion sensors are nor user manageable. Friday, February 22, 2019

Our Previous Work “(Smart)Watch Your Taps” ISWC’15 Friday, February 22, 2019

New Target: QWERTY Keyboards Friday, February 22, 2019

Linear Accelerometer Readings We Asked Ourselves Is it Possible to Infer What is Being Typed on the Keyboard Based on the Wrist Movements Observable by the Smartwatch Motion Sensors? We observed that there was more motion when ever a key on the left side of the keyboard was pressed. Smartwatch worn on left hand. Q M Linear Accelerometer Readings Friday, February 22, 2019

Dividing the Keyboard Thus, an attacker can infer which side of the keyboard was pressed based on the level of activity during a key press. Friday, February 22, 2019

Assuming watch is worn on left hand Further Observations We can also categorize the direction of movement for the watch wearing hand. Normally we type multiple characters at a time, such as words or sentences. Therefore, analyzing pairs of keystrokes can fetch us more information than treating them individually. So, we categorize key pairs based on geographical directions such as N, S….And O represents the same key presses consecutively. Assuming watch is worn on left hand Friday, February 22, 2019

Forming “Word-Profiles” Word-profile for the word “boards”: bo oa ar rd ds R X R . R X L . L E L . L S L . L W L X represent unknown transitions, where right hand alphabets are involved in the character pair. Mention about this challenge, where we don’t have information from one hand. Friday, February 22, 2019

Learning Phase One of the authors typed the training words. Friday, February 22, 2019

Attack Phase Friday, February 22, 2019

Samsung Gear Live smartwatch Evaluation 25 participants aged between 19-32 years. Matlab and PyBrain Matlab for feature extraction. PyBrain for machine learning. Samsung Gear Live smartwatch Anker A7726121 Bluetooth keyboard Friday, February 22, 2019

Results: Basic Text Recovery Dictionary: Ten sentences in List 6 of Harvard sentences Typed: The same ten sentences above L-R classifier misclassifications: 0% N-E-S-W-O classifier misclassifications: ~5% Word Recovery Error: Out of 48 words of four letters or more, only 3 were not recovered correctly (93.75% success in recovery) Friday, February 22, 2019

Similarity Score Closest Matching Word-Profile Frequency of Use Based on number of matching features Frequency of Use As in Dictionary Pool or English Literature Similarity score is checked against all words in the dictionary. Friday, February 22, 2019

Results: Contextual Dictionary Participants typed a paragraph of 40 words (of length four or more) that appear in a National Public Radio (NPR) news article on Greece debt crisis, and this experiment simulates eavesdropping on a reporter typing the NPR news article. The dictionary is formed with words that appear in six other news articles related to Greece debt crisis, that were published a week before the target article. Friday, February 22, 2019

Results: Contextual Dictionary Contextual Dictionary: Percentage of words recovered per participant, presented in descending order of typing speed of the participants. Friday, February 22, 2019

Results: Typing Behavior and Speed We observed that in many instances participants did not follow our assumed layout. Some of the participants frequently used their left hand to press a key on the right side of the keyboard, and vice versa. We also found that participant who typed slower, were less likely to follow the left and right division of the keyboard. Friday, February 22, 2019

Results: Typing Behavior and Speed Talk about attacker’s speed compared to participants. Contextual Dictionary: Percentage of words recovered per participant, presented in descending order of typing speed of the participants. Friday, February 22, 2019

Results: Large Dictionary 38 English words typed by participants. English dictionary of 60,000 words, sorted by frequency of use in English literature. Problem of colliding word-profiles: Show: LXR . RXR . RXL Sums: LXR . RXR . RXL Explain colliding word-profiles. Friday, February 22, 2019

Results: Large Dictionary This is similar to Google search (or Baidu). If the desired search result is on the first page, it is more useful than having to search among 20 pages. We know no one goes to Google second page! Talk about drawbacks in experimental setup of Marquardt et al. [surface vibration] and Berger et al. [acoustic emanation]. A comparison of accuracy of our attack with Marquardt et al. [surface vibration] and Berger et al. [acoustic emanation]. Note that in spite of not having wrist movement information available from the non-watch-wearing hand, our results are roughly comparable for a large (60,000 words) dictionary. Friday, February 22, 2019

Limitations Ambient Wrist Movement Left and Right Handedness. But… Inferring Non-Dictionary Text Friday, February 22, 2019

Smart Mitigation Access control over seemingly innocuous sensors required. But should not be the old-fashioned way. Must be context-aware in order to automatically manage sensor permissions, without having the user to manually change these settings repetitively. Explain poor usability in ACL. Can we cut-off the motion sensors when the user is typing? Why not? So we used the same motion sensors to develop a typing activity detection framework. Friday, February 22, 2019

Proposed Protection Framework (i) a real-time typing activity detection (rTAD) and (ii) a motion sensor access-controller (MSAC) Energy: Activity measured in terms of cumulative linear accelerometer readings. An unworn watch lying on a table has zero energy, while an athlete's watch has high energy. Typing activity typically results in low but nonzero energy. We apply a low pass filter over the linear accelerometer to eliminate high-frequency noise caused by environmental factors. Turnarounds: Major positive to negative (or vice versa) changes on linear accelerometer readings signify the turnarounds adjoining transitional movements between key presses. Multiple turnarounds in close time proximity can be associated with many activities, such as brushing teeth, eating, playing drums, etc. As a result, we need additional features to distinguish typing from other similar activities. Magnetic Field Change: Wrists are not rotated significantly when a user types on a QWERTY keyboard, while sitting in front of a stationary desk. Rapid change in north, east and nadir vectors implies non-typing activity. Direction of Gravity: Gravity generally remains dominant on z-axis of accelerometer while typing on a horizontally placed keyboard. Any major fluctuations or gravity on x-axis or y-axis implies other activities. Step Count: We assume that the user will be stationary while typing on a computer keyboard. Thus, whenever step count increases, we rule out typing activity. Friday, February 22, 2019

rTAD Parameters Energy: Activity measured in terms of cumulative linear accelerometer readings. An unworn watch lying on a table has zero energy, while an athlete's watch has high energy. Typing activity typically results in low but nonzero energy. We apply a low pass filter over the linear accelerometer to eliminate high-frequency noise caused by environmental factors. Turnarounds: Major positive to negative (or vice versa) changes on linear accelerometer readings signify the turnarounds adjoining transitional movements between key presses. Multiple turnarounds in close time proximity can be associated with many activities, such as brushing teeth, eating, playing drums, etc. As a result, we need additional features to distinguish typing from other similar activities. Magnetic Field Change: Wrists are not rotated significantly when a user types on a QWERTY keyboard, while sitting in front of a stationary desk. Rapid change in north, east and nadir vectors implies non-typing activity. Direction of Gravity: Gravity generally remains dominant on z-axis of accelerometer while typing on a horizontally placed keyboard. Any major fluctuations or gravity on x-axis or y-axis implies other activities. Step Count: We assume that the user will be stationary while typing on a computer keyboard. Thus, whenever step count increases, we rule out typing activity. Friday, February 22, 2019

Motion Sensor Access-Controller (MSAC) Complete Blocking Reduced Sampling Rate Random Out of Order Blocks Explain positives and negatives of each. We were not able to implement it, but should be easy task for OS developers to implement. Friday, February 22, 2019

rTAD Evaluation: High Sensitivity Friday, February 22, 2019

rTAD Evaluation: Low Sensitivity Friday, February 22, 2019

rTAD Evaluation Results Results can be further improved with new features. Friday, February 22, 2019

Conclusion A new keystroke inference attack which utilizes wrist-motion data gathered from a smartwatch as side-channel information. A smart protection framework to detect typing activity and automatically regulate sensor access, aimed to improve privacy without degrading utility of the device. Thank You! http://sprite.cs.wichita.edu/ Friday, February 22, 2019