Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3607199.3607203acmotherconferencesArticle/Chapter ViewAbstractPublication PagesraidConference Proceedingsconference-collections
research-article

Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors

Published: 16 October 2023 Publication History

Abstract

Smartphone motion sensors provide cybersecurity attackers with a stealthy way to eavesdrop on nearby acoustic information. Eavesdropping on touchtones emitted by smartphone speakers when users input numbers into their phones exposes sensitive information such as credit card information, banking PINs, and social security card numbers to malicious applications with access to only motion sensor data. This work characterizes this new security threat of touchtone eavesdropping by providing an analysis based on physics and signal processing theory. We show that advanced adversaries who selectively integrate data from multiple motion sensors and multiple sensor axes can achieve over 99% accuracy on recognizing 12 unique touchtones. We further design, analyze, and evaluate several mitigations which could be implemented in a smartphone update. We found that some apparent mitigations such as low-pass filters can undesirably reduce the motion sensor data to benign applications by 83% but only reduce an advanced adversary’s accuracy by less than one percent. Other more informed designs such as anti-aliasing filters can fully preserve the motion sensor data to support benign application functionality while reducing attack accuracy by 50.1%.

References

[1]
S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2019. Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. arXiv preprint arXiv:1907.05972 (2019).
[2]
Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. In NDSS.
[3]
Stephen Beeby, Graham Ensel, Neil M White, and Michael Kraft. 2004. MEMS mechanical sensors. Artech House.
[4]
Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).
[5]
Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, and Kevin Fu. 2018. Blue Note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 1048–1062.
[6]
Raj Bridgelall. 2015. Inertial sensor sample rate selection for ride quality measures. Journal of Infrastructure Systems 21, 2 (2015), 04014039.
[7]
Tianqi Chen and Carlos Guestrin. 2016. XGBoost. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Aug 2016). https://doi.org/10.1145/2939672.2939785
[8]
Yun Chan Cho and Jae Wook Jeon. 2008. Remote robot control system based on DTMF of mobile phone. In 2008 6th IEEE International Conference on Industrial Informatics. IEEE, 1441–1446.
[9]
Android Developers. 2023. Android Debug Bridge. https://developer.android.com/studio/command-line/adb.
[10]
Denis Foo Kune, John Backes, Shane S Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the 34th IEEE Symposium on Security and Privacy (SP). IEEE, 145–159.
[11]
Raffaele Gravina, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. 2017. Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges. Information Fusion 35 (2017), 68–80.
[12]
Jun Han, Albert Jin Chung, and Patrick Tague. 2017. PitchIn: Eavesdropping via Intelligible Speech Reconstruction using Non-Acoustic Sensor Fusion. In 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[13]
Jun Han, Emmanuel Owusu, Le T. Nguyen, Adrian Perrig, and Joy Zhang. 2012. ACComplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS). https://doi.org/10.1109/COMSNETS.2012.6151305
[14]
Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth Pathak, Guoming Zhang, and Xiuzhen Cheng. 2022. Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1757–1773.
[15]
Zhe Hu, Lu Yuan, Stephen Lin, and Ming-Hsuan Yang. 2016. Image deblurring using smartphone inertial sensors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1855–1864.
[16]
Intel. 2023. Intel NUC. https://www.intel.com/content/www/us/en/products/boards-kits/nuc.html.
[17]
Alexandre Karpenko, David Jacobs, Jongmin Baek, and Marc Levoy. 2011. Digital video stabilization and rolling shutter correction using gyroscopes. CSTR 1, 2 (2011), 13.
[18]
Adil Mehmood Khan, Muhammad Hameed Siddiqi, and Seok-Won Lee. 2013. Exploratory data analysis of acceleration signals to select light-weight and accurate features for real-time activity recognition on smartphones. Sensors 13, 10 (2013), 13099–13122.
[19]
Tuljappa M Ladwa, Sanjay M Ladwa, R Sudharshan Kaarthik, Alok Ranjan Dhara, and Nayan Dalei. 2009. Control of remote domestic system using DTMF. In International Conference on Instrumentation, Communication, Information Technology, and Biomedical Engineering 2009. IEEE, 1–6.
[20]
Seoungjun Lee, Dongsoo Har, and Dongsuk Kum. 2016. Drone-assisted disaster management: Finding victims via infrared camera and lidar sensor fusion. In 2016 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE). IEEE, 84–89.
[21]
R. Gary Leonard and George R. Doddington. 1993. TIDIGITS. https://catalog.ldc.upenn.edu/LDC93S10.
[22]
Mark W Maciejewski, Harry Z Qui, Iulian Rujan, Mehdi Mobli, and Jeffrey C Hoch. 2009. Nonuniform sampling and spectral aliasing. Journal of Magnetic Resonance 199, 1 (2009), 88–93.
[23]
Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, and Nitesh Saxena. 2022. EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. arXiv preprint arXiv:2212.12151 (2022).
[24]
Robert J. Marks, II. 1991. Introduction to Shannon Sampling and Interpolation Theory. Springer-Verlag, Berlin, Heidelberg.
[25]
Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (Sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In Conference on Computer and Communications Security (CCS). ACM, New York, NY, USA. https://doi.org/10.1145/2046707.2046771
[26]
Václav Matyáš and Zdeněk Říha. 2002. Biometric authentication—security and usability. In Advanced communications and multimedia security. Springer, 227–239.
[27]
Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1053–1067. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky
[28]
Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. 2012. Tapprints: Your Finger Taps Have Fingerprints. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (Low Wood Bay, Lake District, UK) (MobiSys ’12). ACM, New York, NY, USA, 323–336. https://doi.org/10.1145/2307636.2307666
[29]
S. Narain, T. D. Vo-Huu, K. Block, and G. Noubir. 2016. Inferring User Routes and Locations Using Zero-Permission Mobile Sensors. In 2016 IEEE Symposium on Security and Privacy (SP). 397–413. https://doi.org/10.1109/SP.2016.31
[30]
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. 2012. ACCessory: Password Inference Using Accelerometers on Smartphones(HotMobile). ACM, New York, NY, USA. https://doi.org/10.1145/2162081.2162095
[31]
Thilo Pfau and Patrick Reilly. 2021. How low can we go? Influence of sample rate on equine pelvic displacement calculated from inertial sensor data. Equine Veterinary Journal 53, 5 (2021), 1075–1081.
[32]
Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. 2012. Plagiarizing smartphone applications: attack strategies and defense techniques. In International symposium on engineering secure software and systems. Springer, 106–120.
[33]
C.E. Shannon. 1949. Communication in the Presence of Noise. Proceedings of the IRE 37, 1 (Jan 1949), 10–21. https://doi.org/10.1109/JRPROC.1949.232969
[34]
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium. 881–896.
[35]
Weigao Su, Daibo Liu, Taiyuan Zhang, and Hongbo Jiang. 2021. Towards device independent eavesdropping on telephone conversations with built-in accelerometer. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 4 (2021), 1–29.
[36]
General Tools. 2023. DSM403SD. https://generaltools.com/class-1-sound-level-meter-with-excel-formatted-data-logging-sd-card.
[37]
Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 3–18.
[38]
Yannis Tsividis. 2004. Digital signal processing in continuous time: a possibility for avoiding aliasing and reducing quantization error. In 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 2. IEEE, ii–589.
[39]
Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In 27th USENIX Security Symposium. 1545–1562.
[40]
International Telecommunication Union. 1988. Technical Features of Push-Button Telephone Sets. General Recommendations on Telephone Switching and Signalling (25 11 1988). https://www.itu.int/rec/T-REC-Q.23-198811-I/en.
[41]
Matt Vasilogambros. 2019. Voting by phone is easy. But is it secure?https://gcn.com/articles/2019/07/18/vote-by-phone.aspx.
[42]
Alma Whitten and J Doug Tygar. 1999. Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In USENIX security symposium, Vol. 348. 169–184.
[43]
Steve Winder. 2002. Analog and digital filter design. Elsevier.
[44]
Chen Yan, Yan Long, Xiaoyu Ji, and Wenyuan Xu. 2019. The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1215–1229.
[45]
Li Zhang, Parth H. Pathak, Muchen Wu, Yixin Zhao, and Prasant Mohapatra. 2015. AccelWord: Energy Efficient Hotword Detection Through Accelerometer. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (Florence, Italy) (MobiSys ’15). ACM, New York, NY, USA, 301–315. https://doi.org/10.1145/2742647.2742658
[46]
Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, and Xinwen Fu. 2012. Fingerprint attack against touch-enabled devices. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices. 57–68.

Cited By

View all
  • (2024)A survey of acoustic eavesdropping attacks: Principle, methods, and progressHigh-Confidence Computing10.1016/j.hcc.2024.100241(100241)Online publication date: May-2024

Index Terms

  1. Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
    October 2023
    769 pages
    ISBN:9798400707650
    DOI:10.1145/3607199
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 October 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DTMF
    2. eavesdropping
    3. motion sensor
    4. smartphone
    5. touchtone

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    RAID 2023

    Acceptance Rates

    Overall Acceptance Rate 43 of 173 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)174
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A survey of acoustic eavesdropping attacks: Principle, methods, and progressHigh-Confidence Computing10.1016/j.hcc.2024.100241(100241)Online publication date: May-2024

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media