skip to main content
10.1145/2810103.2813668acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

When Good Becomes Evil: Keystroke Inference with Smartwatch

Authors Info & Claims
Published:12 October 2015Publication History

ABSTRACT

One rising trend in today's consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions of smartwatches shipped, however, the security implications of such devices are not fully understood. Although previous studies have pointed out some privacy concerns about the data that can be collected, like personalized health information, the threat is considered low as the leaked data is not highly sensitive and there is no real attack implemented. In this paper we investigate a security problem coming from sensors in smartwatches, especially the accelerometer. The results show that the actual threat is much beyond people's awareness. Being worn on the wrist, the accelerometer built within a smartwatch can track user's hand movements, which makes inferring user inputs on keyboards possible in theory. But several challenges need to be addressed ahead in the real-world settings: e.g., small and irregular hand movements occur persistently during typing, which degrades the tracking accuracy and sometimes even overwhelms useful signals.

In this paper, we present a new and practical side-channel attack to infer user inputs on keyboards by exploiting sensors in smartwatch. Novel keystroke inference models are developed to mitigate the negative impacts of tracking noises. We focus on two major categories of keyboards: one is numeric keypad that is generally used to input digits, and the other is QWERTY keyboard on which a user can type English text. Two prototypes have been built to infer users' banking PINs and English text when they type on POS terminal and QWERTY keyboard respectively. Our results show that for numeric keyboard, the probability of finding banking PINs in the top 3 candidates can reach 65%, while for QWERTY keyboard, a significant accuracy improvement is achieved compared to the previous works, especially of the success rate of finding the correct word in the top 10 candidates.

References

  1. Android wear. https://developer.android.com/wear/index.html.Google ScholarGoogle Scholar
  2. As smartwatches gain traction, personal data privacy worries mount. http://www.computerworld.com/article/2925311/wearables/as-smartwatches-gain-traction-personal-data-privacy-worries-mount.html.Google ScholarGoogle Scholar
  3. Bbc news. http://www.bbc.com/news/.Google ScholarGoogle Scholar
  4. Cancer patients with depression 'are being overlooked'. http://www.bbc.com/news/health-28954661.Google ScholarGoogle Scholar
  5. The corncob list of more than 58 000 english words. http://www.mieliestronk.com/wordlist.html.Google ScholarGoogle Scholar
  6. Cubic spline data interpolation. http://www.mathworks.com/help/matlab/ref/spline.html.Google ScholarGoogle Scholar
  7. 'deaths averted' at hospitals put into special measures. http://www.bbc.com/news/health-31166211.Google ScholarGoogle Scholar
  8. Detrending data. http://www.mathworks.com/help/matlab/data_analysis/detrending-data.html.Google ScholarGoogle Scholar
  9. Ebola crisis: Experimental vaccine 'shipped to liberia'. http://www.bbc.com/news/health-30943377.Google ScholarGoogle Scholar
  10. Invensense. http://www.invensense.com/.Google ScholarGoogle Scholar
  11. Is it acceptable to wear a watch on the right wrist? http://www.askandyaboutclothes.com/forum/showthread.php?116570-Is-it-acceptable-to-wear-a-watch-on-the-right-wrist.Google ScholarGoogle Scholar
  12. Learn how to touch type. http://www.ratatype.com/learn/.Google ScholarGoogle Scholar
  13. A new wave of gadgets can collect your personal information like never before. http://www.businessinsider.com.au/privacy-fitness-trackers-smartwatches-2014--10.Google ScholarGoogle Scholar
  14. Personal identification number. https://en.wikipedia.org/wiki/Personal_identification_number.Google ScholarGoogle Scholar
  15. Poor water and hygiene 'kills mothers and newborns'. http://www.bbc.com/news/health-30452226.Google ScholarGoogle Scholar
  16. Pos terminals e530 pos. http://landicorp.en.frbiz.com/group-pos_systems/34719013-pos_terminals_e530_pos.html.Google ScholarGoogle Scholar
  17. Watch handedness. https://en.wikipedia.org/wiki/Watch#Handedness.Google ScholarGoogle Scholar
  18. why wear a watch on the wrist where you're hand dominant http://www.reddit.com/r/Watches/comments/1wzub5/question_why_wear_a_watch_on_the_wrist_where/.Google ScholarGoogle Scholar
  19. Annett, M. Handedness and brain asymmetry: The right shift theory. Psychology Press, 2002.Google ScholarGoogle Scholar
  20. Asonov, D., and Agrawal, R. Keyboard acoustic emanations. In IEEE Symposium on Security and Privacy (2004), IEEE Computer Society.Google ScholarGoogle ScholarCross RefCross Ref
  21. Backes, M., Chen, T., Duermuth, M., Lensch, H., and Welk, M. Tempest in a teapot: Compromising reflections revisited. In Security and Privacy, 2009 30th IEEE Symposium on (2009), IEEE, pp. 315--327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Backes, M., Durmuth, M., and Unruh, D. Compromising reflections-or-how to read lcd monitors around the corner. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (2008), IEEE, pp. 158--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Berger, Y., Wool, A., and Yeredor, A. Dictionary attacks using keyboard acoustic emanations. In Proceedings of the 13th ACM conference on Computer and communications security (2006), ACM, pp. 245--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bianchi-Berthouze, N. Understanding the role of body movement in player engagement. Human-Computer Interaction 28, 1 (2013), 40--75.Google ScholarGoogle Scholar
  25. Electronics, L. Lg g watch | powered by android wear. http://www.lg.com/global/gwatch/one/index.html#main, 2015.Google ScholarGoogle Scholar
  26. Fothergill, S., Mentis, H., Kohli, P., and Nowozin, S. Instructing people for training gestural interactive systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2012), ACM, pp. 1737--1746. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Friedman, N., Rowe, J. B., Reinkensmeyer, D. J., and Bachman, M. The manumeter: A wearable device for monitoring daily use of the wrist and fingers.Google ScholarGoogle Scholar
  28. Kwon, D. Y., and Gross, M. A framework for 3d spatial gesture design and modeling using a wearable input device. In Wearable Computers, 2007 11th IEEE International Symposium on (2007), IEEE, pp. 23--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Li, Z., Feng, Z., and Tygar, J. Keyboard acoustic emanations revisited. In Proceedings of the 12th ACM Conference on Computer and Communications Security (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Liang, C., and Chen, H. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In 6th USENIX Conference on Hot Topics in Security, HotSec (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Luinge, H. J., and Veltink, P. H. Measuring orientation of human body segments using miniature gyroscopes and accelerometers. Medical and Biological Engineering and computing 43, 2 (2005), 273--282.Google ScholarGoogle Scholar
  32. Marquardt, P., Verma, A., Carter, H., and Traynor, P. (sp) iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM conference on Computer and communications security (2011), ACM, pp. 551--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choudhury, R. R. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services (2012), ACM, pp. 323--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Owusu, E., Han, J., Das, S., Perrig, A., and Zhang, J. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (2012), ACM, p. 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Raguram, R., White, A. M., Goswami, D., Monrose, F., and Frahm, J.-M. ispy: automatic reconstruction of typed input from compromising reflections. In Proceedings of the 18th ACM conference on Computer and communications security (2011), ACM, pp. 527--536. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., and Wang, H. J. World-driven access control for continuous sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 1169--1181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Shukla, D., Kumar, R., Serwadda, A., and Phoha, V. V. Beware, your hands reveal your secrets! In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 904--917. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Vuagnoux, M., and Pasini, S. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium (2009), pp. 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Xu, Y., Heinly, J., White, A. M., Monrose, F., and Frahm, J.-M. Seeing double: Reconstructing obscured typed input from repeated compromising reflections. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 1063--1074. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Xu, Z., Bai, K., and Zhu, S. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (2012), ACM, pp. 113--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Yue, Q., Ling, Z., Fu, X., Liu, B., Ren, K., and Zhao, W. Blind recognition of touched keys on mobile devices. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 1403--1414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Zhu, T., Ma, Q., Zhang, S., and Liu, Y. Context-free attacks using keyboard acoustic emanations. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. When Good Becomes Evil: Keystroke Inference with Smartwatch

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
        October 2015
        1750 pages
        ISBN:9781450338325
        DOI:10.1145/2810103

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '15 Paper Acceptance Rate128of660submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader