Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao - Proceedings of the 8th ACM Conference on …, 2015 - dl.acm.org
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015•dl.acm.orgToday's smartphones are equipped with precise motion sensors like accelerometer and
gyroscope, which can measure tiny motion and rotation of devices. While they make mobile
applications more functional, they also bring risks of leaking users' privacy. Researchers
have found that tap locations on screen can be roughly inferred from motion data of the
device. They mostly utilized this side-channel for inferring short input like PIN numbers and
passwords, with repeated attempts to boost accuracy. In this work, we study further for longer …
gyroscope, which can measure tiny motion and rotation of devices. While they make mobile
applications more functional, they also bring risks of leaking users' privacy. Researchers
have found that tap locations on screen can be roughly inferred from motion data of the
device. They mostly utilized this side-channel for inferring short input like PIN numbers and
passwords, with repeated attempts to boost accuracy. In this work, we study further for longer …
Today's smartphones are equipped with precise motion sensors like accelerometer and gyroscope, which can measure tiny motion and rotation of devices. While they make mobile applications more functional, they also bring risks of leaking users' privacy. Researchers have found that tap locations on screen can be roughly inferred from motion data of the device. They mostly utilized this side-channel for inferring short input like PIN numbers and passwords, with repeated attempts to boost accuracy. In this work, we study further for longer input inference, such as chat record and e-mail content, anything a user ever typed on a soft keyboard. Since people increasingly rely on smartphones for daily activities, their inputs directly or indirectly expose privacy about them. Thus, it is a serious threat if their input text is leaked.
To make our attack practical, we utilize the shared memory side-channel for detecting window events and tap events of a soft keyboard. The up or down state of the keyboard helps triggering our Trojan service for collecting accelerometer and gyroscope data. Machine learning algorithms are used to roughly predict the input text from the raw data and language models are used to further correct the wrong predictions. We performed experiments on two real-life scenarios, which were writing emails and posting Twitter messages, both through mobile clients. Based on the experiments, we show the feasibility of inferring long user inputs to readable sentences from motion sensor data. By applying text mining technology on the inferred text, more sensitive information about the device owners can be exposed.
ACM Digital Library
Showing the best result for this search. See all results