Skip to content

Commit

Permalink
simplification
Browse files Browse the repository at this point in the history
  • Loading branch information
yeguixin committed Sep 8, 2017
1 parent 74248e0 commit ac97127
Show file tree
Hide file tree
Showing 11 changed files with 901 additions and 820 deletions.
1 change: 1 addition & 0 deletions TIFS.tex
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,7 @@
\begin{spacing}{0.98}
\bibliographystyle{IEEEtranS}
\balance
\vspace{-3mm}
\bibliography{refs}
\end{spacing}
\end{document}
Expand Down
57 changes: 37 additions & 20 deletions background.tex
Original file line number Diff line number Diff line change
@@ -1,14 +1,15 @@
\begin{figure*}[!ht]
\centering
\includegraphics[width=\textwidth]{fig/overview.pdf}
\vspace{-4mm}
\vspace{-8mm}
\caption{Overview of the attack.
Our system takes in a video segment that records the unlocking process (a). The adversary first marks two areas of interest on the first video frame (b): one contains the fingertip involved in pattern drawing, and the other contains part of the device. Our system then tries to track the fingertip's location w.r.t. to the device.
The tracking algorithm produces a fingertip movement trajectory from the camera's perspective (c) which is then transformed to the user's perspective (d). Finally, the resulted trajectory in (d) is mapped to several candidate patterns (e) to be tested on the target device (f). }
\label{fig:fig2}
\vspace{-5mm}
\end{figure*}

\vspace{-3mm}
\section{Background}
\subsection{Android Pattern Lock}
\label{section: android_pattern_lock}
Expand All @@ -33,8 +34,8 @@ \section{Background}
automatically locked after five failed tries.
Previous works also show that a brute-force attack is likely to fail on patterns with complex
structures~\cite{Kelley2012Guess,Mazurek2013Measuring}.
\vspace{-5mm}

%\vspace{-2mm}
\subsection{Threat Model}
\label{sec:scenarios}
In our threat model, we assume an adversary wants to access some sensitive information from or to install malware on a
Expand All @@ -46,20 +47,28 @@ \section{Background}
The attack starts from filming how the user unlocks the device. Video recording
can be done on-site or ahead of time. The video will then be processed to identify a small number of patterns to be
tested on the target device. Because filming can be carried out from a distance of as far as 2 meters using a
mobile phone camera and the camera does not need to directly face the target device, this activity often will not be
mobile phone camera and the camera does not need to directly face the target device (or about 9 meters using a digital single reflex camera), this activity often will not be
noticed by the user. Moreover, given that many users use the same pattern across devices and applications, the pattern
obtained from one device could also be used to break the user's other devices. We want to stress that the goal of this paper is to
demonstrate the feasibility of a new attack and the countermeasure is left to our future work.

%\vspace{2mm}
\noindent \textbf{Examples of Filming Scenarios} Figure~\ref{fig:fig1} illustrates three scenarios where filming can be
performed without raising suspicion to many users. For all the examples presented in Figure~\ref{fig:fig1}, the
filming camera had a left- or right-front view angle from the target device and did not directly face the screen of the target device. Due to the filming distance (2-3 meters), the recoded video typically does not have a clear vision of
\noindent \textbf{Examples of Filming Scenarios}
Figure~\ref{fig:fig1} illustrates two day-to-day scenarios where filming can be
performed without raising suspicion to many users. For the two examples presented in Figure~\ref{fig:fig1}, the
filming camera had a left- or right-front view angle from the target device indoor or outdoor and did not directly face the screen of the target device. Due to the filming distance (2-3 meters), the recoded video typically does not have a clear vision of
the content displayed on the screen. This observation can be confirmed by the video snapshot placing
alongside each scenario, where it is impossible to identify the content shown on the screen.
The examples given in Figure~\ref{fig:fig1} are some of the day-to-day
scenarios where security of the user's device can be compromised under
our attack.


%Figure~\ref{fig:fig1} illustrates three scenarios where filming can be
%performed without raising suspicion to many users. For all the examples presented in Figure~\ref{fig:fig1}, the
%filming camera had a left- or right-front view angle from the target device and did not directly face the screen of the target device. Due to the filming distance (2-3 meters), the recoded video typically does not have a clear vision of
%the content displayed on the screen. This observation can be confirmed by the video snapshot placing
%alongside each scenario, where it is impossible to identify the content shown on the screen.
%The examples given in Figure~\ref{fig:fig1} are some of the day-to-day
%scenarios where security of the user's device can be compromised under
%our attack.

%\vspace{2mm}
\noindent \textbf{Assumptions}
Expand All @@ -69,13 +78,21 @@ \section{Background}
This is particularly true when holding a large-screen device by hands.
To launch the
attack, the attacker needs to know the layout of the grid, e.g. whether it is
a $3 \times 3$ or a $6 \times 6$ grid. Our approach is to generate a set of
candidate patterns for each of the Android pattern grids and the attacker can simply decide
which set of candidate patterns to use after seeing the target device (at the time the
layout of the grid will be available). However, unlike prior work on
video-based attacks on keystroke based authentication~\cite{shukla2014beware}, our approach does not
require having knowledge of the console's geometry. In other words, the size
of the screen or the position of the pattern grid on the screen does not
affect the accuracy of our attack. We also assume the video does not need to
capture any content displayed on the screen. This assumption makes previous
video-based attacks on pattern lock~\cite{aviv2010smudge} inapplicable.
a $3 \times 3$ or a $6 \times 6$ grid. This can be simply decided by seeing target device.

%Our attack requires the video footage to have a vision of the user's
%fingertip that was involved in pattern drawing as well as part of the device (e.g. an edge of a phone).
%We believe this is a reasonable assumption because in practice many users often do not fully cover their fingers and the entire device when drawing a pattern.
%This is particularly true when holding a large-screen device by hands.
%To launch the
%attack, the attacker needs to know the layout of the grid, e.g. whether it is
%a $3 \times 3$ or a $6 \times 6$ grid. Our approach is to generate a set of
%candidate patterns for each of the Android pattern grids and the attacker can simply decide
%which set of candidate patterns to use after seeing the target device (at the time the
%layout of the grid will be available). However, unlike prior work on
%video-based attacks on keystroke based authentication~\cite{shukla2014beware}, our approach does not
%require having knowledge of the console's geometry. In other words, the size
%of the screen or the position of the pattern grid on the screen does not
%affect the accuracy of our attack. We also assume the video does not need to
%capture any content displayed on the screen. This assumption makes previous
%video-based attacks on pattern lock~\cite{aviv2010smudge} inapplicable.
1 change: 1 addition & 0 deletions conclusions.tex
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
\vspace{-2mm}
\section{Conclusions}
This paper has presented a novel video-based side-channel attack for
Android pattern lock. The attack is based on a video filmed a distance of 2 meters away from the target device using a mobile phone camera. The attack is
Expand Down
Loading

0 comments on commit ac97127

Please sign in to comment.