skip to main content
10.1145/2789168.2790121acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

MoLe: Motion Leaks through Smartwatch Sensors

Authors Info & Claims
Published:07 September 2015Publication History

ABSTRACT

Imagine a user typing on a laptop keyboard while wearing a smart watch. This paper asks whether motion sensors from the watch can leak information about what the user is typing. While its not surprising that some information will be leaked, the question is how much? We find that when motion signal processing is combined with patterns in English language, the leakage is substantial. Reported results show that when a user types a word $W$, it is possible to shortlist a median of 24 words, such that $W$ is in this shortlist. When the word is longer than $6$ characters, the median shortlist drops to $10$. Of course, such leaks happen without requiring any training from the user, and also under the (obvious) condition that the watch is only on the left hand. We believe this is surprising and merits awareness, especially in light of various continuous sensing apps that are emerging in the app market. Moreover, we discover additional "leaks" that can further reduce the shortlist -- we leave these exploitations to future work.

References

  1. Sandip Agrawal, Ionut Constandache, Shravan Gaonkar, Romit Roy Choudhury, Kevin Caves, and Frank DeRuyter, "Using mobile phones to write in air," in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services. 2011, MobiSys '11, pp. 15--28, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Shahriar Nirjon, Jeremy Gummeson, Dan Gelb, and Kyu-Han Kim, "TypingRing: A wearable ring platform for text input," in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 2015, MobiSys '15, pp. 227--239, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jiayang Liu, Zhen Wang, Lin Zhong, J. Wickramasuriya, and V. Vasudevan, "uWave: Accelerometer-based personalized gesture recognition and its applications," in Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, March 2009, pp. 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chao Xu, Parth H. Pathak, and Prasant Mohapatra, "Finger-writing with smartwatch: A case for finger and hand gesture recognition using smartwatch," in Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications. 2015, HotMobile '15, pp. 9--14, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Abhinav Parate, Meng-Chieh Chiu, Chaniel Chadowitz, Deepak Ganesan, and Evangelos Kalogerakis, "Risq: Recognizing smoking gestures with inertial sensors on a wristband," in Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. 2014, MobiSys '14, pp. 149--161, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sangki Yun, Yi-Chao Chen, and Lili Qiu, "Turning a mobile device into a mouse in the air," in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 2015, MobiSys '15, pp. 15--29, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. "Word Frequency Data Set," http://www.wordfrequency.info/.Google ScholarGoogle Scholar
  8. "MATLAB Peak Analysis Library," http://www.mathworks.com/help/signal/examples/peak-analysis.html.Google ScholarGoogle Scholar
  9. "Camera Calibration Toolbox for Matlab," http://www.vision.caltech.edu/bouguetj/calib_doc/.Google ScholarGoogle Scholar
  10. Li Zhuang, Feng Zhou, and J. D. Tygar, "Keyboard acoustic emanations revisited," ACM Trans. Inf. Syst. Secur., vol. 13, no. 1, pp. 3:1--3:26, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dmitri Asonov and Rakesh Agrawal, "Keyboard acoustic emanations," in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, May 2004, pp. 3--11.Google ScholarGoogle Scholar
  12. Denis Foo Kune and Yongdae Kim, "Timing attacks on pin input devices," in Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010, CCS '10, pp. 678--680, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dawn Xiaodong Song, David Wagner, and Xuqing Tian, "Timing analysis of keystrokes and timing attacks on SSH," in Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10. 2001, SSYM'01, USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kevin S. Killourhy and Roy A. Maxion, "Comparing anomaly-detection algorithms for keystroke dynamics," in Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference on, June 2009, pp. 125--134.Google ScholarGoogle Scholar
  15. "Key Sweeper," http://samy.pl/keysweeper/.Google ScholarGoogle Scholar
  16. Martin Vuagnoux and Sylvain Pasini, "Compromising electromagnetic emanations of wired and wireless keyboards," in Proceedings of the 18th Conference on USENIX Security Symposium. 2009, SSYM'09, pp. 1--16, USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor, "(sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers," in Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011, CCS '11, pp. 551--562, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang, "Accessory: Password inference using accelerometers on smartphones," in Proceedings of the Twelfth Workshop on Mobile Computing Systems and Applications. 2012, HotMobile '12, pp. 9:1--9:6, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Liang Cai and Hao Chen, "TouchLogger: Inferring keystrokes on touch screen from smartphone motion," in Proceedings of the 6th USENIX Conference on Hot Topics in Security. 2011, HotSec'11, pp. 9--9, USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Liang Cai and Hao Chen, "On the practicality of motion based keystroke inference attack," in Proceedings of the 5th International Conference on Trust and Trustworthy Computing. 2012, TRUST'12, pp. 273--290, Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury, "Tapprints: Your finger taps have fingerprints," in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. 2012, MobiSys '12, pp. 323--336, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yan Michalevsky, Dan Boneh, and Gabi Nakibly, "Gyrophone: Recognizing speech from gyroscope signals," in 23rd USENIX Security Symposium (USENIX Security 14). Aug. 2014, pp. 1053--1067, USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. MoLe: Motion Leaks through Smartwatch Sensors

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
            September 2015
            638 pages
            ISBN:9781450336192
            DOI:10.1145/2789168

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 September 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            MobiCom '15 Paper Acceptance Rate38of207submissions,18%Overall Acceptance Rate440of2,972submissions,15%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          ePub

          View this article in ePub.

          View ePub