2019
DOI: 10.1007/s10207-019-00449-8
|View full text |Cite
|
Sign up to set email alerts
|

SonarSnoop: active acoustic side-channel attacks

Abstract: We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim's finger movements can be inferred to steal Android unlock patterns. In our empirical study, the number of candidate unlock patterns that an attacker must try to authenticate herself to a Samsung … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(28 citation statements)
references
References 33 publications
0
28
0
Order By: Relevance
“…For example, acoustics can reflect, and travel through a variety of mediums and at varying distances. Taking advantage of these properties, inaudible acoustics emitted from a smartphone can bounce off nearby moving objects, and the corresponding echo can carry target information used to infer the object's movements [26], [27]. An MDM scenario can be similarly applied to use emitted signals to detect the oscillation of a person's chest to infer heart and breathing rate [17].…”
Section: B Applications Of Side-channel Attacks In Cybmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, acoustics can reflect, and travel through a variety of mediums and at varying distances. Taking advantage of these properties, inaudible acoustics emitted from a smartphone can bounce off nearby moving objects, and the corresponding echo can carry target information used to infer the object's movements [26], [27]. An MDM scenario can be similarly applied to use emitted signals to detect the oscillation of a person's chest to infer heart and breathing rate [17].…”
Section: B Applications Of Side-channel Attacks In Cybmentioning
confidence: 99%
“…The side-channel attack frameworks offer a more structured approach to the use of side-channels with the following concepts common to all instances of side-channel attacks (as depicted within Figure 2 ): System structure: the logical components [4] Method: named attack strategies including differential analysis correlation , and transformation to frequency or other domains [5] , [35] Modelling/Profiling: uses a training phase to characterise a target system before attacking [4] , or for developing a template based on extensive traces [36] Modality: includes timing [37] , [38] , power usage [5] , [10] , electromagnetic radiation [5] , [22] , magnetic field [30] , acoustic [20] , [27] , visible light [32] , infra-red [39] , and vibration [21] , [23] Access: level of physical access; invasive, semi-invasive, or non-invasive [5] , [40] Remote versus local: modalities that can be measured from a distance allow for remote sensing [5] , [22] Control: active modification to cause side-channel leakage (feeding in a particular input) [5] , [8] , [34] , or passively accepting leaked data [5] Subsequent sections identify examples of side-channel sensing in MDM and develop a corresponding systematic categorisation appropriate to the MDM domain.
FIGURE 2.
…”
Section: Side-channel Attacks In Cybmentioning
confidence: 99%
See 1 more Smart Citation
“…The column threshold (i.e., 3) is set empirically (by changing it randomly between 1 and 100) for detecting the changes occurring due to user's fingers and hand. A similar method is also used in [16] and [17] to track the finger movements and use them for detecting 2 − D gestures and snooping the unlock patterns of mobile devices, respectively. Figure 16 shows the newly generated matrix by comparing the columns of the correlation matrix shown in Figure 15 in accordance with the aforementioned method.…”
Section: ) E-sign Generationmentioning
confidence: 99%
“…Android's graphical password has been studied in many contexts, including for security (e. g., smudges [8], [13], shoulder surfing [43], [4], [18], other side-channel attacks [50], [14], [48], [49]), user choice [37], [1], [28], selection aids [36], [15], and under modifications [3], [35]. As mentioned, there has been a number of proposals for pattern strength meters [1], [33], [31], which we will describe in more detail in the following section.…”
Section: Background and Related Workmentioning
confidence: 99%