海报:TapSnoop——通过聆听移动设备上的点击声音来推断点击次数

Hyosu Kim, Daehyeok Kim, Byunggill Joe, Yunxin Liu, I. Shin
{"title":"海报:TapSnoop——通过聆听移动设备上的点击声音来推断点击次数","authors":"Hyosu Kim, Daehyeok Kim, Byunggill Joe, Yunxin Liu, I. Shin","doi":"10.1145/2938559.2938595","DOIUrl":null,"url":null,"abstract":"Mobile device users tap a touch-screen for entering sensitive information such as passwords and PIN numbers, and many works have proposed an attack model snooping such tapstrokes especially with the use of built-in sensors [1, 2, 3]. These studies raise the serious security concerns with the following attack scenario. A malicious application runs in the foreground as a normal chatting application, collecting a training set of sensor data generated from tapstrokes. While a user types her credit card number for purchasing something on a shopping application, it sneakingly takes sensor streams in the background and infers the tapped number by comparing the streams with the training data. However, in practice, the existing works have shown a limited inference accuracy, due to the following reasons. First, the intensity of tapstrokes is typically much low, resulting in a subtle change on sensor data. Second, mobile devices generally come with small on-screen keyboards where keys are very close to each other. Thus, it is essential to perform fine-grained tapstroke localization. Third, each mobile device has its own hardware characteristics with regard to screen’s size and thickness, as well as built-in sensor’s sensitivity. This inherently leads to different characteristics of tapstrokes for different devices. Last, smartphone users can use their devices in various places with different noise levels, while moving around. Therefore, it should be able to infer tapstrokes robustly against the environmental changes.","PeriodicalId":298684,"journal":{"name":"MobiSys '16 Companion","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Poster: TapSnoop -- Inferring Tapstrokes from Listening to Tap Sound on Mobile Devices\",\"authors\":\"Hyosu Kim, Daehyeok Kim, Byunggill Joe, Yunxin Liu, I. Shin\",\"doi\":\"10.1145/2938559.2938595\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile device users tap a touch-screen for entering sensitive information such as passwords and PIN numbers, and many works have proposed an attack model snooping such tapstrokes especially with the use of built-in sensors [1, 2, 3]. These studies raise the serious security concerns with the following attack scenario. A malicious application runs in the foreground as a normal chatting application, collecting a training set of sensor data generated from tapstrokes. While a user types her credit card number for purchasing something on a shopping application, it sneakingly takes sensor streams in the background and infers the tapped number by comparing the streams with the training data. However, in practice, the existing works have shown a limited inference accuracy, due to the following reasons. First, the intensity of tapstrokes is typically much low, resulting in a subtle change on sensor data. Second, mobile devices generally come with small on-screen keyboards where keys are very close to each other. Thus, it is essential to perform fine-grained tapstroke localization. Third, each mobile device has its own hardware characteristics with regard to screen’s size and thickness, as well as built-in sensor’s sensitivity. This inherently leads to different characteristics of tapstrokes for different devices. Last, smartphone users can use their devices in various places with different noise levels, while moving around. Therefore, it should be able to infer tapstrokes robustly against the environmental changes.\",\"PeriodicalId\":298684,\"journal\":{\"name\":\"MobiSys '16 Companion\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MobiSys '16 Companion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2938559.2938595\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MobiSys '16 Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2938559.2938595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动设备用户通过点击触摸屏输入密码和PIN码等敏感信息,许多研究提出了一种窥探此类点击的攻击模型,特别是使用内置传感器[1,2,3]。这些研究提出了以下攻击场景的严重安全问题。恶意应用程序在前台作为正常聊天应用程序运行,收集从点击产生的传感器数据的训练集。当用户在购物应用程序上输入她的信用卡号码购买东西时,它会在后台偷偷地获取传感器数据流,并通过将数据流与训练数据进行比较来推断被点击的数字。然而,在实践中,由于以下原因,现有的工作显示出有限的推理精度。首先,敲击的强度通常很低,导致传感器数据的微妙变化。其次,移动设备通常带有小屏幕键盘,其中按键彼此非常接近。因此,执行细粒度敲击行程定位是必要的。第三,每个移动设备都有自己的硬件特点,屏幕的大小和厚度,以及内置传感器的灵敏度。这必然导致不同设备的敲击敲击的不同特性。最后,智能手机用户可以在各种噪音水平不同的地方使用他们的设备,同时四处走动。因此,它应该能够根据环境变化强有力地推断敲击动作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Poster: TapSnoop -- Inferring Tapstrokes from Listening to Tap Sound on Mobile Devices
Mobile device users tap a touch-screen for entering sensitive information such as passwords and PIN numbers, and many works have proposed an attack model snooping such tapstrokes especially with the use of built-in sensors [1, 2, 3]. These studies raise the serious security concerns with the following attack scenario. A malicious application runs in the foreground as a normal chatting application, collecting a training set of sensor data generated from tapstrokes. While a user types her credit card number for purchasing something on a shopping application, it sneakingly takes sensor streams in the background and infers the tapped number by comparing the streams with the training data. However, in practice, the existing works have shown a limited inference accuracy, due to the following reasons. First, the intensity of tapstrokes is typically much low, resulting in a subtle change on sensor data. Second, mobile devices generally come with small on-screen keyboards where keys are very close to each other. Thus, it is essential to perform fine-grained tapstroke localization. Third, each mobile device has its own hardware characteristics with regard to screen’s size and thickness, as well as built-in sensor’s sensitivity. This inherently leads to different characteristics of tapstrokes for different devices. Last, smartphone users can use their devices in various places with different noise levels, while moving around. Therefore, it should be able to infer tapstrokes robustly against the environmental changes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信