Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3489212.3489231guideproceedingsArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article
Free access

Chaperone: real-time locking and loss prevention for smartphones

Published: 12 August 2020 Publication History

Abstract

Smartphone loss affects millions of users each year and causes significant monetary and data losses. Device tracking services (e.g., Google's "Find My Device") enable the device owner to secure or recover a lost device, but they can be easily circumvented with physical access (e.g., turn on airplane mode). An effective loss prevention solution should immediately lock the phone and alert the owner before they leave without the phone. We present such an opensource, real-time system called Chaperone that does not require additional hardware. Chaperone adopts active acoustic sensing to detect a phone's unattended status by tracking the owner's departure via the built-in speaker and microphone. It is designed to robustly operate in real-world scenarios characterized by bursting high-frequency noise, bustling crowds, and diverse environmental layouts. We evaluate Chaperone by conducting over 1,300 experiments at a variety of locations including coffee shops, restaurants, transit stations, and cars, under different testing conditions. Chaperone provides an overall precision rate of 93% and an overall recall rate of 96% for smartphone loss events. Chaperone detects these events in under 0.5 seconds for 95% of the successful detection cases. We conduct a user study (n = 17) to investigate participants' smartphone loss experiences, collect feedback on using Chaperone, and study different alert methods. Most participants were satisfied with Chaperone's performance for its detection ability, detection accuracy, and power consumption. Finally, we provide an implementation of Chaperone as a standalone Android app.

References

[1]
F. Adib, Z. Kabelac, D. Katabi, and R. C Miller. 3D tracking via body radio reflections. In NSDI '14, 2014.
[2]
Business-news.eu. 4% or ₠20 million: A stolen mobile may cost you hundreds, but could cost your employer millions. https://www.business-news.eu/2019-4-or-20-million-a-stolen-mobile-may-cost-you-hundreds-but-could-cost-your-employer-millions, 2019.
[3]
C. Cai, R. Zheng, and M. Hu. A survey on acoustic sensing. arXiv preprint arXiv:1901.03450, 2019.
[4]
DigitalTrends. Study reveals americans lost $30 billion worth of mobile phones last year. https://www.digitaltrends.com/mobile/study-reveals-americans-lost-30-billion-of-mobile-phones-last-year/, 2012.
[5]
G. Elert. Frequency range of human hearing. The Physics Factbook, 2003.
[6]
Google. Jacquard Jacket. https://atap.google.com/jacquard/, 2018.
[7]
M. J. Hussain, L. Lu, and S. Gao. An RFID based smartphone proximity absence alert system. IEEE TMC, 16(5), May 2017.
[8]
Kaspersky Lab. Around 23,000 devices go missing every month, finds Kaspersky Lab. Press release (Aug. 9, 2018). https://www.kaspersky.com/about/press-releases/2018_missing-devices, 2018.
[9]
H. Khan, A. Atwater, and U. Hengartner. Itus: An implicit authentication framework for Android. In MobiCom '14. ACM, 2014.
[10]
H. Khan, U. Hengartner, and D. Vogel. Targeted mimicry attacks on touch input based implicit authentication schemes. In MobiSys '16. ACM, 2016.
[11]
L.A. Times. 68% of smartphone theft victims never recover device, report says. https://www.latimes.com/business/technology/lafi-tn-70-smartphone-theft-victims-never-recover-device-20140507-story.html, 2014.
[12]
P. Lazik, N. Rajagopal, O. Shih, B. Sinopoli, and A. Rowe. ALPS: A Bluetooth and ultrasound platform for mapping and localization. In SenSys '15, 2015.
[13]
T. Li, Y. Chen, J. Sun, X. Jin, and Y. Zhang. iLock: Immediate and automatic locking of mobile devices against data theft. In CCS '16. ACM, 2016.
[14]
X. Liu, D. Wagner, and S. Egelman. Detecting phone theft using machine learning. In ICISS '18. ACM, 2018.
[15]
W. Mao, J. He, and L. Qiu. CAT: High-precision acoustic motion tracking. In MobiCom '16. ACM, 2016.
[16]
W. Mao, M. Wang, and L. Qiu. AIM: Acoustic imaging on a mobile. In MobiSys '18. ACM, 2018.
[17]
Y. Mirsky, A. Shabtai, L. Rokach, B. Shapira, and Y. Elovici. SherLock vs Moriarty: A smartphone dataset for cybersecurity research. In AISec '16. ACM, 2016.
[18]
NetworkWorld.com. More data breaches caused by lost devices than malware or hacking, Trend Micro says. https://www.networkworld.com/article/2988643/device-loss-data-breach-malware-hacking-trend-micro-report.html, 2015.
[19]
Patec. Mini Bluetooth anti-lost anti-theft alarm kid pet object finder. https://www.amazon.ca/Patec%C2%AE-Bluetooth-Anti-lost-Anti-theft-Object/dp/B00MPGKL1U, 2014.
[20]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2011.
[21]
Protect Your Bubble. Nearly half a million Brits had phones stolen last year. https://uk.protectyourbubble.com/our-blog/blog/2017/03/23/nearly-half-million-brits-mobile-phone-stolen-last-year, 2017.
[22]
Y. Ren, C. Wang, J. Yang, and Y. Chen. Fine-grained sleep monitoring: Hearing your breathing with smartphones. In INFOCOM '15. IEEE, 2015.
[23]
K. Sun, T. Zhao, W. Wang, and L. Xie. VSkin: Sensing touch gestures on surfaces of mobile devices using acoustic signals. In MobiCom '18. ACM, 2018.
[24]
Symantec. The Symantec smartphone honey stick project. https://www.symantec.com/content/en/us/about/presskits/b-symantec-smartphonehoney-stick-project.en-us.pdf, 2012.
[25]
TheRegister.co.uk. A quarter of banks' data breaches are down to lost phones and laptops. https://www.theregister.co.uk/2016/08/25/us_bank_breaches_survey/, 2016.
[26]
Y. Tung, D. Bui, and K. G. Shin. Cross-platform support for rapid development of mobile acoustic sensing applications. In MobiSys '18. ACM, 2018.
[27]
Y. Tung and K. G Shin. Use of phone sensors to enhance distracted pedestrians' safety. IEEE TMC, 2018.
[28]
Uber. The 2019 Uber lost & found index. https://www.uber.com/newsroom/2019-uber-lost-found-index, 2019.
[29]
W. Wang, A. X Liu, M. Shahzad, K. Ling, and S. Lu. Understanding and modeling of WiFi signal based human activity recognition. In MobiCom '15. ACM, 2015.
[30]
W. Wang, A. X. Liu, and K. Sun. Device-free gesture tracking using acoustic signals. In MobiCom '16. ACM, 2016.
[31]
Y. Wang, K. Wu, and L. M Ni. WiFall: Device-free fall detection by wireless networks. IEEE TMC, 2017.
[32]
J. Wiese, T. S. Saponas, and A.J. B. Brush. Phoneprioception: Enabling mobile phones to infer where they are kept. In CHI '13. ACM, 2013.
[33]
Xiaomi. Mi Band. https://www.mi.com/global/miband/, 2014.
[34]
X. Yang, K. Hasan, N. Bruce, and P. Irani. Surround-See: Enabling peripheral vision on smartphones during active use. In UIST '13. ACM, 2013.
[35]
X. Yu, Z. Wang, K. Sun, W. T. Zhu, N. Gao, and J. Jing. Remotely wiping sensitive data on stolen smartphones. In ASIACCS '14. ACM, 2014.
[36]
S. Yun, Y. Chen, H. Zheng, L. Qiu, and W. Mao. Strata: Fine-grained acoustic-based device-free tracking. In MobiSys '17. ACM, 2017.
[37]
H. Zhang, W. Du, P. Zhou, M. Li, and P. Mohapatra. DopEnc: Acoustic-based encounter profiling using smartphones. In MobiCom '16. ACM, 2016.
[38]
B. Zhou, M. Elbadry, R. Gao, and F. Ye. BatMapper: Acoustic sensing based indoor floor plan construction using smartphones. In MobiSys '17. ACM, 2017.
[39]
B. Zhou, J. Lohokare, R. Gao, and F. Ye. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In MobiCom' 18. ACM, 2018.
[40]
M. Zhou, Q. Wang, J. Yang, Q. Li, F. Xiao, Z. Wang, and X. Chen. PatternListener: Cracking Android pattern lock using acoustic signals. In CCS '18. ACM, 2018.
[41]
Y. Zhu, Z. Xiao, Y. Chen, Z. Li, M. Liu, B. Y Zhao, and H. Zheng. Et tu Alexa? When commodity WiFi devices turn into adversarial motion sensors. In NDSS '20, 2020.

Index Terms

  1. Chaperone: real-time locking and loss prevention for smartphones
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SEC'20: Proceedings of the 29th USENIX Conference on Security Symposium
    August 2020
    2809 pages
    ISBN:978-1-939133-17-5

    Sponsors

    • Facebook
    • Microsoft
    • IBM
    • ByteDance
    • Google Inc.

    Publisher

    USENIX Association

    United States

    Publication History

    Published: 12 August 2020

    Qualifiers

    • Research-article

    Acceptance Rates

    Overall Acceptance Rate 40 of 100 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 82
      Total Downloads
    • Downloads (Last 12 months)48
    • Downloads (Last 6 weeks)13
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media