Mole: Motion Leaks through Smartwatch Sensors

Slides:



Advertisements
Similar presentations
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Advertisements

Mining User Similarity Based on Location History Yu Zheng, Quannan Li, Xing Xie Microsoft Research Asia.
QR Code Recognition Based On Image Processing
Optimizing search engines using clickthrough data
Evaluation of Decision Forests on Text Categorization
Slide Ruler. ? X 5" On today’s menu...  What happened with Gravity  Noise  The tool today  Fundamental Limitations  Magical Christmas Land  (Where.
Towards Twitter Context Summarization with User Influence Models Yi Chang et al. WSDM 2013 Hyewon Lim 21 June 2013.
Patch to the Future: Unsupervised Visual Prediction
Lecture 07 Segmentation Lecture 07 Segmentation Mata kuliah: T Computer Vision Tahun: 2010.
EHealth Workshop 2003Virginia Tech e-Textiles Group An E-Textile System for Motion Analysis Mark Jones, Thurmon Lockhart, and Thomas Martin Virginia Tech.
Real Time Motion Capture Using a Single Time-Of-Flight Camera
InSight: Recognizing Humans without Face Recognition He Wang, Xuan Bao, Romit Roy Choudhury, Srihari Nelakuditi.
Accelerometer-based Transportation Mode Detection on Smartphones
fMRI data analysis at CCBI
Real-time Embedded Face Recognition for Smart Home Fei Zuo, Student Member, IEEE, Peter H. N. de With, Senior Member, IEEE.
Ensemble Learning: An Introduction
1 Integration of Background Modeling and Object Tracking Yu-Ting Chen, Chu-Song Chen, Yi-Ping Hung IEEE ICME, 2006.
Hand Movement Recognition By: Tokman Niv Levenbroun Guy Instructor: Todtfeld Ari.
Visually Fingerprinting Humans without Face Recognition
Multiple Object Class Detection with a Generative Model K. Mikolajczyk, B. Leibe and B. Schiele Carolina Galleguillos.
ICBV Course Final Project Arik Krol Aviad Pinkovezky.
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
2008/06/06 Y.H.Chang Towards Effective Browsing of Large Scale Social Annotations1 Towards Effective Browsing of Large Scale Social Annotations WWW 2007.
APT: Accurate Outdoor Pedestrian Tracking with Smartphones TsungYun
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion Liang Cai and Hao Chen UC Davis.
黃福銘 (Angus F.M. Huang) ANTS Lab, IIS, Academia Sinica TrajPattern: Mining Sequential Patterns from Imprecise Trajectories.
STUDY, MODEL & INTERFACE WITH MOTOR CORTEX Presented by - Waseem Khatri.
Snooping Keystrokes with mm-level Audio Ranging on a Single Phone
Bayesian Extension to the Language Model for Ad Hoc Information Retrieval Hugo Zaragoza, Djoerd Hiemstra, Michael Tipping Presented by Chen Yi-Ting.
Keystroke Recognition using WiFi Signals
Department of Computer and Electrical Engineering A Study of Time-based Features and Regularity of Manipulation to Improve the Detection of Eating Activity.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
HiQuadLoc: An RSS-Based Indoor Localization System for High-Speed Quadrotors 1 Tuo Yu*, Yang Zhang*, Siyang Liu*, Xiaohua Tian*, Xinbing Wang*, Songwu.
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems USENIX 2009 Kehuan Zhang, Indiana University, Bloomington XiaoFeng Wang,
Real-Time Simultaneous Localization and Mapping with a Single Camera (Mono SLAM) Young Ki Baik Computer Vision Lab. Seoul National University.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Current Works Determined drift during constant velocity test caused by slight rotation which results in gravity affecting accelerometers Analyzed data.
IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo a, Jose G. Delgado-Frias Publisher: Journal of Systems.
Calculating ‘g’ practical
Cell Segmentation in Microscopy Imagery Using a Bag of Local Bayesian Classifiers Zhaozheng Yin RI/CMU, Fall 2009.
 Using Touchloggers To Build User Profiles Through Machine Learning Craig Dezangle.
An E-Textiles. Virginia Tech e-Textiles Group Design of an e-textile computer architecture – Networking – Fault tolerance – Power aware – Programming.
Chapter 6 Activity Recognition from Trajectory Data Yin Zhu, Vincent Zheng and Qiang Yang HKUST November 2011.
Machine Learning: Ensemble Methods
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
Topic Modeling for Short Texts with Auxiliary Word Embeddings
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
Mobile Activity Recognition
ArmKeyBoard A Mobile Keyboard Instrument Based on Chord-scale System
Supervised Time Series Pattern Discovery through Local Importance
Tracking Objects with Dynamics
Posture Monitoring System for Context Awareness in Mobile Computing
Virtual Safe: Unauthorized Movement Detection for Mobile Devices
Motion with Constant Acceleration
Using Mobile Phones to Write in Air
Mobile Sensor-Based Biometrics Using Common Daily Activities
Structure from motion Input: Output: (Tomasi and Kanade)
Chao Xu, Parth H. Pathak, et al. HotMobile’15
Timing Analysis of Keystrokes and Timing Attacks on SSH
DAISY Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Anindya Maiti, Murtuza Jadliwala, Jibo He Igor Bilogrevic
Activity Recognition Classification in Action
AsiaCCS 2016 Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo.
Keystroke Recognition using Wi-Fi Signals
Source: Pattern Recognition Letters, Article In Press, 2007
Palanivel Kodeswaran, Ravi Kokku, Sayandeep Sen, Mudhakar Srivatsa
INF 141: Information Retrieval
Structure from motion Input: Output: (Tomasi and Kanade)
WSExpress: A QoS-Aware Search Engine for Web Services
Presentation transcript:

Mole: Motion Leaks through Smartwatch Sensors He wang Ted Tsung-Te Lai Romit Roy Choudhury University of Illinois at Urbana-Champaign Champaign, IL, USA Presenter: Hao Kong

outline Motivation Preliminary System Overview System Design Evaluation

Can smartwatch know what you are typing? Prevent user’s input data from being stolen or eavesdropped is a research hotspot in the area of security and privacy. With the popularity of IoT, smartwatches show a growing acceptance among users. Motion sensors are integrated into smartwatches, which could record the motion state of hands.

Can smartwatch know what you are typing? When a user is typing with a smartwatch, the hand moves according to each letter. Is it possible to infer input words through smartwatch motion sensors? If so, how much?

outline Motivation Preliminary System Overview System Design Evaluation

A correlation between watch movement and keystrokes.

Detection of each individual keystrokes.

2d displacements of individual and continuous typing

Challenges Correctly detect a typing motion from the noisy data obtained by motion sensors. The watch location cannot represent each keystroke. Information form the right hand is missing.

outline Motivation Preliminary System Overview System Design Evaluation

Architecture

outline Motivation Preliminary System Overview System Design Evaluation

Keystroke Detection

Keystroke Detection Approaches: Using a low threshold to mark all potential keystrokes. Extract features from the Z-peaks, the 3-axis displacement, velocity, acceleration, etc. Train bagged decision trees to detect keystrokes.

Keystroke Detection

Key-Press Location Estimation Define an absolute coordinate system. Estimate and remove gravity. Estimate the coordinate value and calculate projected acceleration. Calibrate by mean removal. Kalman smoothing.

Architecture

Point Cloud Fitting The key intuition is that relative motions between keys should be similar between users.

Point Cloud Fitting Finding each convex hull Calculate the centroids and perform rotate and scale

Architecture

Bayesian Inference s

Bayesian Inference 𝑃 𝑊 𝑂 = 𝑃 𝑂 𝑊 𝑃(𝑊) 𝑃(𝑂) Since 𝑃(𝑂) is the same for all possible words, and we assume 𝑃 𝑊 is equal among words. 𝑃(𝑊|𝑂)∝𝑃(𝑂|𝑊) When we obtain such an observation O, which word can maximize the probability?

Bayesian Inference Using the number of keystrokes When 2 keystrokes are detected likely unlikely good, then hence, forever

Bayesian Inference 2. Adding watch displacement After the fitting of UPC and CPC, we can match detected keystrokes into a specific character.

Bayesian Inference 2. Adding watch displacement Note that typing a word consists of sequential movements and the current displacement is indeed influenced by the location of the previous characters.

Bayesian Inference 3. Considering keystroke interval This paper obtains the time interval distribution of every possible character-sequence that is preceded and followed by two left-hand characters, and use this distribution in the Bayesian model.

Bayesian Inference

outline Motivation Preliminary System Overview System Design Evaluation

Experiment Setup Device: Galaxy Gear Live smart watch. 8 Participants: 300 words for each participant. Words are selected from 5000 most frequently used words. 2 labeled point clouds (training data) 2 persons collect offline data with top-500 longest words.

Performance How well can Melo guess each words?

Performance How are the three observation improve system performance?

Performance Impacts of different factors Word length Number of left hand characters Sampling rate Keyboard variant

Limitations Single word only unable to detect space English words only digital and non-English words are not applicable Required standard typing method

Conclusion Mole: Motion leaks through smartwatch sensor Identify leaks when using watch motion sensors to infer input words Type a word W with length>6, it can shortlist 10 words (rank 10) on average that includes W.