4.6 Article

Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

Augmented PIN Authentication through Behavioral Biometrics

Matteo Nerini et al.

Summary: This paper proposes a PIN authentication method based on smartphone movements, which can enhance security and achieve low error rates and fast processing time.

SENSORS (2022)

Article Chemistry, Multidisciplinary

Draw-a-Deep Pattern: Drawing Pattern-Based Smartphone User Authentication Based on Temporal Convolutional Neural Network

Junhong Kim et al.

Summary: This study proposes a deep learning-based smartphone user authentication method using sequential data obtained from drawing patterns on the touchscreen. The proposed model, called DDP, is robust to common threats and requires fewer parameters for training. The TCN-based model achieves excellent authentication performance and higher computational efficiency compared to the RNN-based model.

APPLIED SCIENCES-BASEL (2022)

Article Engineering, Electrical & Electronic

PIN Inference Attack: A Threat to Mobile Security and Smart none-Controlled Robots

Smita Naval et al.

Summary: The proliferation of smartphones with various sensors has created a large user base, including robots controlled by smartphones. These smartphones, equipped with high-performance processors and motion sensors, are used as software robots to track user activities. However, the use of non-permission based motion sensors poses privacy threats, which has been highlighted in recent studies. This paper presents a potential misuse of technology where smartphones can be hacked using PIN Inference attack, endangering mobile security. The experiments show that an adversary can infer the PIN of a smartphone by analyzing motion sensor data.

IEEE SENSORS JOURNAL (2022)

Article Computer Science, Information Systems

On the Security of Smartphone Unlock PINs

Philipp Markert et al.

Summary: The study shows that using six-digit PINs does not significantly improve security over four-digit PINs against throttled attacks, and may even decrease security. The blocklists used by iOS for PIN selection have limited effectiveness for four-digit PINs, with larger blocklists showing better security gains.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2021)

Article Computer Science, Software Engineering

Securing PIN-based authentication in smartwatches with just two gestures

Meriem Guerar et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Engineering, Electrical & Electronic

Human Activities Classification Using Biaxial Seismic Sensors

Lorenzo Pucci et al.

IEEE SENSORS LETTERS (2020)

Article Computer Science, Theory & Methods

Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses

Rui Zhao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Proceedings Paper Computer Science, Hardware & Architecture

2GesturePIN: Securing PIN-based Authentication on Smartwatches

Meriem Guerar et al.

2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE) (2019)

Article Computer Science, Information Systems

Stealing PINs via mobile sensors: actual risk versus user perception

Maryam Mehrnezhad et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)

Article Computer Science, Information Systems

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Raphael Spreitzer et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Artificial Intelligence

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference

Chao Shen et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)

Article Chemistry, Analytical

Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing

Muhammad Ehatisham-ul-Haq et al.

SENSORS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Poster Abstract: User Authentication using Wrist Mounted Inertial Sensors

Md Abu Sayeed Mondol et al.

2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN) (2017)

Article Computer Science, Information Systems

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

Toan Van Nguyen et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Authentication of Smartphone Users Using Behavioral Biometrics

Abdulaziz Alzubaidi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript

Maryam Mehrnezhad et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2016)

Proceedings Paper Computer Science, Theory & Methods

Sensor-based Mobile Web Fingerprinting and Cross-site Input Inference Attacks

Chuan Yue

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) (2016)

Article Computer Science, Information Systems

Input extraction via motion-sensor behavior analysis on smartphones

Chao Shen et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)