Advertisement

Exploiting Autocorrect to Attack Privacy

  • Brian J. KidneyEmail author
  • Jonathan Anderson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10368)

Abstract

Text prediction algorithms present in many devices use machine learning to help a user type but they also present the opportunity to leak information about the user. This raises privacy and security concerns for users that are trying to remain anonymous. We present an attack inspired by IND–CPA to demonstrate how autocorrect could be used to identify a user. We show that, with prior knowledge of the user, they could be identified with as little as 512 kB of written text with a probability of 95%.

References

  1. 1.
    Smith, S.L., Goodwin, N.C.: Alphabetic data entry via the touch-tone pad: a comment. Hum. Fact. J. Hum. Fact. Ergon. Soc. 13(2), 189–190 (1971)CrossRefGoogle Scholar
  2. 2.
    Grover, D., King, M., Kuschler, C.: Patent no. US5818437, reduced keyboard disambiguating computer. Tegic communications, Inc., Seattle (1998)Google Scholar
  3. 3.
    Rabiner, L.R., Juang, B.-H.: An introduction to hidden Markov models. IEEE ASSP Mag. 3(1), 4–16 (1986)CrossRefGoogle Scholar
  4. 4.
    Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Palacios, R.: Autocomplete or: how I learned to stop spelling and love our AI overlords. https://github.com/rodricios/autocomplete. Accessed 29 Jan 2016
  6. 6.
    Norvig, P.: How to write a spelling corrector. http://norvig.com/spell-correct.html. Accessed 29 Jan 2016
  7. 7.
    Graham-Cumming, J.: Naive Bayesian text classification. Dr. Dobb’s J. 372, 16–20 (2005)Google Scholar
  8. 8.
    Bandara, U., Wijayarathna, G.: Deep neural networks for source code author identification. In: Lee, M., Hirose, A., Hou, Z.-G., Kil, R.M. (eds.) ICONIP 2013. LNCS, vol. 8227, pp. 368–375. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-42042-9_46 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringMemorial UniversitySt. John’sCanada

Personalised recommendations