Abstract
The security of wearable devices user’s privacy data has become more and more concerned because of the high accuracy of the embedded sensors. Existing methods of obtaining privacy data often rely on installations of dedicated hardware, or accurate numerical calculation of sensor data, which do not have flexible adaptability. In this paper we utilize a multi-SVM and a KNN classifier using only accelerometer data and fuzzy coordinates to get the privacy data such as password directly with a higher accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Worldwide smartwatch market will see modest growth in 2016 before swelling to 50 million units in 2020, according to IDC. https://www.idc.com/getdoc.jsp?containerId=prUS41736916
Live healthier and achieve more: this is Microsoft Band. https://www.microsoft.com/microsoft-band/en-us
Balzarotti, D., Cova, M., Vigna, G.: Clearshot: eavesdropping on keyboard input from video. In: IEEE S&P, pp. 170–183 (2008)
Maggi, F., et al.: A fast eavesdropping attack against touchscreens. In: IEEE IAS, pp. 320–325 (2011)
Shukla, D., Kumar, R., Serwadda, A., Phoha, V.V.: Beware, your hands reveal your secrets! In: ACM CCS, pp. 904–917 (2014)
Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystroke inference with smartwatch. In: ACM CCS, pp. 1273–1285 (2015)
Wang, H., Lai, T.T.-T., Choudhury, R.R.: Mole: motion leaks through smartwatch sensors. In: ACM MobiCom, pp. 155–166 (2015)
Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: ACM MobiSys, pp. 323–336 (2012)
Ren, Y., Chen, Y., Chuah, M.C., Yang, J.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. (2014)
Sherman, M., et al.: User-generated free-form gestures for authentication: security and memorability. In: ACM MobiSys, pp. 176–189 (2014)
Liu, L., et al.: Toward detection of unsafe driving with wearables. In: ACM WearSys, pp. 27–32 (2015)
Parate, A., et al.: RisQ: recognizing smoking gestures with inertial sensors on a wristband. In: ACM MobiSys, pp. 149–161 (2014)
Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: ACM WISEC, pp. 113–124 (2012)
Friedman, N., Rowe, J.B., Reinkensmeyer, D., Bschman, M.: The manumeter: a wearable device for monitoring daily use of the wrist and fingers. IEEE J Biomed. Health Inform. 18(6), 1804–1812 (2014)
Using the accelerometer: isolate the force of gravity with the low-pass filter and remove the gravity contribution with the high-pass filter. https://developer.android.com/guide/topics/sensors/sensor_motion.html
Researchers show ATM theft by thermal imaging. https://phys.org/news/2011-09-atm-theft-thermal-imaging.html
Wang, J., Zhao, K., Zhang, X., Peng, C.: Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization. In: ACM Mobysis, pp. 14–27 (2014)
Liu, J., Wang, Y., Kar, K., Chen, Y., Yang, J., Gruteser, M.: Snooping keystrokes with mm-level audio ranging on a single phone. In: ACM Mobicom (2015)
Marquardt, P., Verma, A., Carter, H., Traynor, P.: (sp)iphone: decoding vibrations from nearby keyboards using mobile phone accelerometers. In: ACM CCS, pp. 551–562 (2011)
Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe? Your wearable devices reveal your personal pin. In: The ACM, pp. 189–200 (2016)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61403301 and Grant 61773310, in part by the China Postdoctoral Science Foundation under Grant 2014M560783 and Grant 2015T81032, in part by the Natural Science Foundation of Shaanxi Province under Grant 2015JQ6216, and in part by the Fundamental Research Funds for the Central Universities under Grant xjj2015115.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shen, C., Ren, Z., Chen, Y., Wang, Z. (2017). On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)