Skip to main content

On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

  • 2174 Accesses

Abstract

The security of wearable devices user’s privacy data has become more and more concerned because of the high accuracy of the embedded sensors. Existing methods of obtaining privacy data often rely on installations of dedicated hardware, or accurate numerical calculation of sensor data, which do not have flexible adaptability. In this paper we utilize a multi-SVM and a KNN classifier using only accelerometer data and fuzzy coordinates to get the privacy data such as password directly with a higher accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Worldwide smartwatch market will see modest growth in 2016 before swelling to 50 million units in 2020, according to IDC. https://www.idc.com/getdoc.jsp?containerId=prUS41736916

  2. Live healthier and achieve more: this is Microsoft Band. https://www.microsoft.com/microsoft-band/en-us

  3. Balzarotti, D., Cova, M., Vigna, G.: Clearshot: eavesdropping on keyboard input from video. In: IEEE S&P, pp. 170–183 (2008)

    Google Scholar 

  4. Maggi, F., et al.: A fast eavesdropping attack against touchscreens. In: IEEE IAS, pp. 320–325 (2011)

    Google Scholar 

  5. Shukla, D., Kumar, R., Serwadda, A., Phoha, V.V.: Beware, your hands reveal your secrets! In: ACM CCS, pp. 904–917 (2014)

    Google Scholar 

  6. Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystroke inference with smartwatch. In: ACM CCS, pp. 1273–1285 (2015)

    Google Scholar 

  7. Wang, H., Lai, T.T.-T., Choudhury, R.R.: Mole: motion leaks through smartwatch sensors. In: ACM MobiCom, pp. 155–166 (2015)

    Google Scholar 

  8. Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: ACM MobiSys, pp. 323–336 (2012)

    Google Scholar 

  9. Ren, Y., Chen, Y., Chuah, M.C., Yang, J.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. (2014)

    Google Scholar 

  10. Sherman, M., et al.: User-generated free-form gestures for authentication: security and memorability. In: ACM MobiSys, pp. 176–189 (2014)

    Google Scholar 

  11. Liu, L., et al.: Toward detection of unsafe driving with wearables. In: ACM WearSys, pp. 27–32 (2015)

    Google Scholar 

  12. Parate, A., et al.: RisQ: recognizing smoking gestures with inertial sensors on a wristband. In: ACM MobiSys, pp. 149–161 (2014)

    Google Scholar 

  13. Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: ACM WISEC, pp. 113–124 (2012)

    Google Scholar 

  14. Friedman, N., Rowe, J.B., Reinkensmeyer, D., Bschman, M.: The manumeter: a wearable device for monitoring daily use of the wrist and fingers. IEEE J Biomed. Health Inform. 18(6), 1804–1812 (2014)

    Article  Google Scholar 

  15. Using the accelerometer: isolate the force of gravity with the low-pass filter and remove the gravity contribution with the high-pass filter. https://developer.android.com/guide/topics/sensors/sensor_motion.html

  16. Researchers show ATM theft by thermal imaging. https://phys.org/news/2011-09-atm-theft-thermal-imaging.html

  17. Wang, J., Zhao, K., Zhang, X., Peng, C.: Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization. In: ACM Mobysis, pp. 14–27 (2014)

    Google Scholar 

  18. Liu, J., Wang, Y., Kar, K., Chen, Y., Yang, J., Gruteser, M.: Snooping keystrokes with mm-level audio ranging on a single phone. In: ACM Mobicom (2015)

    Google Scholar 

  19. Marquardt, P., Verma, A., Carter, H., Traynor, P.: (sp)iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: ACM CCS, pp. 551–562 (2011)

    Google Scholar 

  20. Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe? Your wearable devices reveal your personal pin. In: The ACM, pp. 189–200 (2016)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61403301 and Grant 61773310, in part by the China Postdoctoral Science Foundation under Grant 2014M560783 and Grant 2015T81032, in part by the Natural Science Foundation of Shaanxi Province under Grant 2015JQ6216, and in part by the Fundamental Research Funds for the Central Universities under Grant xjj2015115.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Shen, C., Ren, Z., Chen, Y., Wang, Z. (2017). On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics