skip to main content
10.1145/2307636.2307666acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Tapprints: your finger taps have fingerprints

Published:25 June 2012Publication History

ABSTRACT

This paper shows that the location of screen taps on modern smartphones and tablets can be identified from accelerometer and gyroscope readings. Our findings have serious implications, as we demonstrate that an attacker can launch a background process on commodity smartphones and tablets, and silently monitor the user's inputs, such as keyboard presses and icon taps. While precise tap detection is nontrivial, requiring machine learning algorithms to identify fingerprints of closely spaced keys, sensitive sensors on modern devices aid the process. We present TapPrints, a framework for inferring the location of taps on mobile device touch-screens using motion sensor data combined with machine learning analysis. By running tests on two different off-the-shelf smartphones and a tablet computer we show that identifying tap locations on the screen and inferring English letters could be done with up to 90% and 80% accuracy, respectively. By optimizing the core tap detection capability with additional information, such as contextual priors, we are able to further magnify the core threat.

References

  1. S. Agrawal, I. Constandache, S. Gaonkar, R. Roy Choudhury, K. Caves, and F. DeRuyter. Using Mobile Phones to Write in Air. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 15--28. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Azizyan, I. Constandache, and R. Roy Choudhury. Surroundsense: Mobile Phone Localization via Ambience Fingerprinting. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 261--272. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Becker, R. Cáceres, K. Hanson, J. Loh, S. Urbanek, A. Varshavsky, and C. Volinsky. A Tale of One City: Using Cellular Network Data for Urban Planning. IEEE Pervasive Computing, Vol. 10, No. 4, October-December 2011, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Block and A. Popescu. Device Orientation Event Specification. W3C, Draft 12 July 2011.Google ScholarGoogle Scholar
  5. L. Breiman. Random Forests. In Machine Learning, volume 45(1), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Cai and H. Chen. Touchlogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the 6th USENIX conference on Hot topics in security (HotSec'11). USENIX Association, Berkeley, CA, USA, pages 9--9, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Owusu, J. Han, S. Das, A. Perrig and J. Zhang. ACCessory: Password Inference using Accelerometers on Smartphones. In Proceedings of the 13th Workshop on Mobile Computing Systems and Applications (HotMobile'12). San Diego, CA, USA, 20121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Cai, S. Machiraju, and H. Chen. Defending Against Sensor-Sniffing Attacks on Mobile Phones. In Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Caruana, A. Niculescu-Mizil, G. Crew, and A. Ksikes. Ensemble Selection from Libraries of Models. In Proceedings of the twenty-first international conference on Machine learning, ICML '04, pages 18--, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. G. Dietterich. Ensemble Methods in Machine Learning. In Multiple Classifier Systems, pages 1--15, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Domingos. Bayesian Averaging of Classifiers and the Overfitting Problem. In In Proceedings 17th International Conference on Machine Learning, pages 223--230. Morgan Kaufmann, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting Privacy Leaks in iOS Applications. In Proceedings of the Network and Distributed System Security Symposium, 2011.Google ScholarGoogle Scholar
  13. W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: an Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1--6. USENIX Association, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Foo Kune and Y. Kim. Timing Attacks on Pin Input Devices. In Proceedings of the 17th ACM conference on Computer and communications security (CCS '10), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Jahrer, A. Töscher, and R. Legenstein. Combining Predictions for Accurate Recommender Systems. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pages 693--702, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. Campbell. A Survey of Mobile Phone Sensing. Communications Magazine, IEEE, 48(9):140--150, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Lu, J. Yang, Z. Liu, N. Lane, T. Choudhury, and A. Campbell. The Jigsaw Continuous Sensing Engine for Mobile Phone Applications. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, pages 71--84. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. V. M. and P. S. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In Proceedings of the 18th conference on USENIX security symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iphone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In Proceedings of the 18th ACM conference on Computer and communications security, pages 551--562. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. McCullagh and J. A. Nelder. Generalized Linear Models (Second edition). London: Chapman & Hall, 1989.Google ScholarGoogle Scholar
  21. S. McKinley and M. Levine. Cubic Spline Interpolation. College of the Redwoods, 1998.Google ScholarGoogle Scholar
  22. E. Miluzzo, N. Lane, K. Fodor, R. Peterson, H. Lu, M. Musolesi, S. Eisenman, X. Zheng, and A. Campbell. Sensing Meets Mobile Social Networks: the Design, Implementation and Evaluation of the CenceMe Application. In Proceedings of the 6th ACM conference on Embedded network sensor systems, pages 337--350. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Pinkas and T. Sander. Securing Passwords Against Dictionary Attacks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 161--170. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Poh, K. Kim, A. Goessling, N. Swenson, and R. Picard. Cardiovascular Monitoring Using Earphones and a Mobile Device. Pervasive Computing, IEEE, (99):1--1, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: a Stealthy and Context-Aware SoundTrojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS '11), 2011.Google ScholarGoogle Scholar
  26. B. Schoelkopf, C. Burges, and A. Smola. Advances in Kernel Methods - Support Vector Learning. MIT Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. L. Zhuang, F. Zhou, and J. D. Tygar. Keyboard Acoustic Emanations Revisited. ACM Trans. Inf. Syst. Secur., 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Killourhy and R. Maxion. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on, pages 125--134. IEEE, 2009.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Tapprints: your finger taps have fingerprints

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '12: Proceedings of the 10th international conference on Mobile systems, applications, and services
      June 2012
      548 pages
      ISBN:9781450313018
      DOI:10.1145/2307636

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 June 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader