資源描述:
《MoLe Motion Leaks through Smartwatch Sensors MoLe:通過SwittWaCH傳感器的運動泄漏》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、MoLe:MotionLeaksthroughSmartwatchSensorsHeWangTedTsung-TeLaiRomitRoyChoudhuryUniversityofIllinoisatUniversityofIllinoisatUniversityofIllinoisatUrbana-ChampaignUrbana-ChampaignUrbana-ChampaignChampaign,IL,USAChampaign,IL,USAChampaign,IL,USAhewang5@illinois
2、.edutedlai@illinois.educroy@illinois.eduABSTRACTcorequestionoftencomesto:whatcanbeinferredfromagivensensordata?Everysooften,we?ndthathighlysurprisinginfer-Imagineausertypingonalaptopkeyboardwhilewearingaencescanbemadefromanapparentlyharmlessdata,forcingsm
3、artwatch.Thispaperaskswhethermotionsensorsfromtheustopushbackoninformationexposure.Whilethisisabroadwatchcanleakinformationaboutwhattheuseristyping.Whileareaofresearch,andimmenseworkhasbeenperformedinthisitsnotsurprisingthatsomeinformationwillbeleaked,the
4、ques-direction,newplatformsandapplicationswarrantacontinuoustionishowmuch?We?ndthatwhenmotionsignalprocessingvigiloninformationleakage.ThispaperlooksintoanarrowiscombinedwithpatternsinEnglishlanguage,theleakageispieceofthisgeneralproblem.Weask:canaccelero
5、meterandsubstantial.ReportedresultsshowthatwhenausertypesawordgyroscopedatafromsmartwatchesbeminedtoinferthewordsW,itispossibletoshortlistamedianof24words,suchthatWthatauseristyping.Inotherwords,giventhatauser’swristisinthisshortlist.Whenthewordislongerth
6、an6characters,movesinthegranularityoffewcentimeterswhiletyping,canthemedianshortlistdropsto10.Ofcourse,suchleakshappenthecorrespondingmotiondatabeusedtoderivethekeysthatwithoutrequiringanytrainingfromtheuser,andalsoundertheuserhastyped?Ifso,therami?cation
7、sareserious–asmartthe(obvious)conditionthatthewatchisonlyonthelefthand.watchappcanbedisguisedasanactivitytrackertoheavilyWebelievethisissurprisingandmeritsawareness,especiallyinleakauser’semails,searchqueries,andotherkeyboard-typedlightofvariouscontinuous
8、sensingappsthatareemergingindocuments.Unlikekeystrokeloggersthatneedto?ndloopholestheappmarket.Moreover,wediscoveradditional“l(fā)eaks”thatintheoperatingsystem,theactivitytrackermalwarecanobtaincanfurtherreducetheshortl