David Berend, Dr. Shivam Bhasin, Dr. Bernhard Jungk

Slides:



Advertisements
Similar presentations
Performance Testing Process
Advertisements

15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Presented by: Tom Staley. About Paper by Emiliano Miluzzo Alexander Varshavsky Suhrid Balakrishnan Romit Roy Choudhury Originally presented at MobiSys2012,
Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,
DARWIN PHONES: THE EVOLUTION OF SENSING AND INFERENCE ON MOBILE PHONES PRESENTED BY: BRANDON OCHS Emiliano Miluzzo, Cory T. Cornelius, Ashwin Ramaswamy,
LBVC: Towards Low-bandwidth Video Chats on Smartphones Xin Qi, Qing Yang, David T. Nguyen, Gang Zhou, Ge Peng College of William and Mary 1.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Multi-criteria infrastructure for location-based applications Shortly known as: Localization Platform Ronen Abraham Ido Cohen Yuval Efrati Tomer Sole'
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
Bryan Matthews Institute for Transport Studies University of Leeds The Equity Implications of Smartphones for Disabled People’s Travel Experiences theoretical.
Predicting Demographics through smartphone sensors Itay Hazan Dr. Asaf Shabtai 1.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
* Hassan Khan,Aaron Atwater,and Urs Hengartner. Outline Background Introduction for IA Previous work on IA challenge Introduction to Itus Itus for app.
TapPrints: Your Finger Taps Have Fingerprints Emiliano Miluzzo*, Alex Varshavsky*, Suhrid Balakrishnan*, Romit R. Choudhury + * at&t Labs – Research, USA.
FLOOR CANDY.
Chapter 2 Securing Network Server and User Workstations.
Computers, part of your life – Grade 11
Saving lives, changing minds. Gender and Diversity Accountability to beneficiaries and beneficiary communications Gender and Diversity Training.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Network Virtualization
Target Classification in Wireless Distributed Sensor Networks (WSDN) Using AI Techniques Can Komar
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
More Security and Programming Language Work on SmartPhones Karthik Dantu and Steve Ko.
Emotional Intelligence Vivian Tseng, Matt Palmer, Jonathan Fouk Group #41.
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers By Chen Song, Feng Lin, Zongjie Ba, Kui Ren, Chi.
Multi-Device UI Development for Task-Continuous Cross-Channel Web Applications Enes Yigitbas, Thomas Kern, Patrick Urban, Stefan Sauer
COMPSCI 720 Security for Smart-devices Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses [1] Harry Jackson hjac660 [1] Das, Anupam,
Using Hand Gestures for Alternative User Verification
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Security of Digital Signatures
Spying on Android Users Through Targeted Ads
Generalized and Hybrid Fast-ICA Implementation using GPU
Koji Nakao, Dai Arisue NICT, Japan
Stealing PINs via mobile sensors
Flow Group Smart Wireless
Presentation by Jun Hao Xu
Name Of The College & Dept
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Privacy Leakage in Personalized Mobile In-App Ads
Developing a Prototype
MOBILE DEVICE OPERATING SYSTEM
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
CODAN NGT Voice Encryptor Option
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Students: Meiling He Advisor: Prof. Brain Armstrong
Keystroke Biometric Studies with Short Numeric Input on Smartphones
ARTIFICIAL INTELLIGENCE IN SOFTWARE TESTING
HOLISDER Integrating Real-Intelligence in Energy Management Systems enabling Holistic Demand Response Optimization in Buildings and Districts Project presentation.
DAISY Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Network Security – Kerberos
Chapter Nineteen Security.
12 STEPS TO A GDPR AWARE NETWORK
Course Project Topics for CSE5469
Anindya Maiti, Murtuza Jadliwala, Jibo He Igor Bilogrevic
The Digital Business with SAP Business One
How to Mitigate the Consequences What are the Countermeasures?
Boule Medical AB Quality Control – a profitable business Kenneth Wikner, International Product Manager.
Xin Qi, Matthew Keally, Gang Zhou, Yantao Li, Zhen Ren
2N Access Unit 2.0 Multi-technology access control readers.
Detection Detect the breach and protect the data. By,
How to Download And Install McAfee Mobile Security on iOS?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Digital Voice Recorder Market Size Growth During Forecast Period.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

There Goes Your PIN Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting David Berend, Dr. Shivam Bhasin, Dr. Bernhard Jungk Temasek Laboratories at Nanyang Technological University Hardware Assurance Group 28th August, 2018 13th September, 2018

Background Smartphones evolved to daily companions

Background Equipped with various motion and health sensors

Background Sensor data accessible without permission

Background Data used to gain insights on private information

Background Data used to gain insights on private information

Scenario * * 8 7 Install malicous application Train classification system with sensor data Measure sensors during password-input Classify and reconstruct password Unlock smartphone with classified password

Implementation Save measured sensor data Preprocess cut data streams * * 8 7 Save measured sensor data Preprocess cut data streams Link sensor data to keys Train & test classifier

Our Approach Previous work This work Four keys combined being classified Keys classified individually 10,000 classes trainable 50 combinations trained Tested with training data 10 classes trainable 10,000 combinations classifiable Separate testing with ~500 recordings

Sensor Success & Algorithmic Performance* *accumulated success after 20 guesses

Optimization & Insights* Enlarging the data stream of PIN‘s digit 0 ms 25 ms 50 ms 74.10% 68.70% 71.40% 78.20% 70.10% 72.10% 83.70% 76.90% 75.50% Inclusive and exclusive training A B C ABC 70.10% 79.60% 16.70% 30.00% 17.90% 20.50% AB BC CA A 6.10% B 6.70% C 5.30% *accumulated success after 20 guesses

Behavioural Profiling Further Applications Behavioural Profiling Daily Cycles Tapping Behaviour Battery Leakage

Implications of AI on Mobile Security Mobile devices have become powerful enough to run extensive machine learning algorithms themselves New developed sensors are highly accurate, thus reducing noise and increasing learning potential Data accessibility is still very high, which causes an open door to private information for the public

Countermeasures Developer OS Manufacturer Consumer Randomised keyboard Disabling sensors during sensitive input Fast frequency certificate Disabling background sensor measurement Manufacturer Consumer Implementing sensors with less frequency Raising higher awareness More permissions to grant *accumulated success after 20 guesses

Thank You!

Q&A