Snooping Passcodes in Mobile Payment Using Wrist-Worn Wearables

Snooping Passcodes in Mobile Payment Using Wrist-Worn Wearables

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables Chen Wang∗, Jian Liu∗, Xiaonan Guo†, Yan Wang‡ and Yingying Chen∗ ∗WINLAB, Rutgers University, North Brunswick, NJ 08902, USA †Indiana University-Purdue University Indianapolis, Indianapolis, IN 46202, USA ‡Binghamton University, Binghamton, NY 13902, USA [email protected], [email protected], [email protected] [email protected], [email protected] Abstract—Mobile payment has drawn considerable attention due to its convenience of paying via personal mobile devices at anytime and anywhere, and passcodes (i.e., PINs or patterns) are the first choice of most consumers to authorize the payment. This paper demonstrates a serious security breach and aims to raise the awareness of the public that the passcodes for authorizing transactions in mobile payments can be leaked by exploiting the embedded sensors in wearable devices (e.g., smartwatches). We present a passcode inference system, WristSpy, which examines to what extent the user’s PIN/pattern during the mobile payment could be revealed from a single wrist-worn wearable device under different passcode input scenarios involving either two hands or a single hand. In particular, WristSpy has the capability to accurately reconstruct fine-grained hand movement trajectories and infer PINs/patterns when mobile and wearable devices are on two hands through building a Euclidean distance-based model and developing a training-free parallel PIN/pattern inference algorithm. When both devices are on the same single hand, Fig. 1. Mobile payment examples and representative passcode input scenarios. a highly challenging case, WristSpy extracts multi-dimensional features by capturing the dynamics of minute hand vibrations from moderate accuracy (< 10% in 5 tries) because it is hard and performs machine-learning based classification to identify to capture fine-grained hand movements of the user. Recent PIN entries. Extensive experiments with 15 volunteers and 1600 studies [5]–[7] demonstrate that motion sensors embedded in passcode inputs demonstrate that an adversary is able to recover the increasingly popular wearable devices (e.g., smartwatches a user’s PIN/pattern with up to 92% success rate within 5 tries under various input scenarios. and fitness trackers) possess a more severe threat. For example, wearable devices can track the user’s arm movements [5], or, I. INTRODUCTION more surprisingly, reveal the user’s PIN when he/she accesses With the prevalent use of mobile devices (e.g., smart- an ATM [7] or POS machine [6] using the hand wearing the phones), mobile payments become increasingly attractive be- wearable device. In this work, we raise a more challenging cause they allow users to perform near real-time transactions question: can the attacker infer the user’s passcode on the anytime and anywhere conveniently. As illustrated in Fig- small-sized smartphone screen from the wearable device in ure 1(a), users can easily use their digital wallets for in-store the practical scenarios, where no restrictions are imposed on payments, make online purchases via in-app payments, and their passcode inputting ways? perform money transfer between two accounts using mobile We classify the passcode input scenarios into two categories, money transfer. Thus, mobile payments bring users complete namely two-hand and one-hand, based on which hand is hold- freedom from the shackles of currency and credit cards in ing the mobile device and which wrist is wearing the wearable transactions. The latest forecast [1] shows that the US in-store device during the mobile payment process. In the two-hand mobile payments volume will reach $800 billion by 2019. scenario, the user has the mobile and wearable devices on two The extreme convenient utility of mobile payments also hands respectively when he/she enters the PIN or pattern (i.e., makes it an attractive target for adversaries. As reported by Figure 1(b)). Whereas in the one-hand scenario, the user holds the recent U.S. Consumer Payment Study, passcodes are the the mobile device with same hand wearing the wearable device first choice for 66% consumers during mobile payment [2]. (i.e., Figure 1(c)). Note that the one-hand scenario is more Currently, the passcodes used by mobile payment are either challenging than the two-hand scenario because both cases in PIN or pattern entries. Investigations have shown that the Figure 1(c) result in weak sensor readings on the wearable accelerations or timing information on the smartphone can be device. Although existing work [8], [9] has shown that single utilized to reveal the user’s PIN/pattern [3], [4], indicating key input on the smartphone screen can be classified by using the leakage of smartphone sensing data could cause privacy the sensor data from the smartwatch, they only consider one- breach. However, the smartphone sensor-based studies suffer hand scenario and are hard to reveal complete PINs due to moderate accuracy. The unrestricted various passcode input keypad by reconstructing the fine-grained hand movement scenarios and the fine-grained wrist motion dynamics behind trajectories. are still left unexplored. Hence, the attacker’s capability of • WristSpy extracts unique features over the time duration of using the wearable device to infer the user’s passcodes needs each tap in the one-hand scenarios. The multi-dimensional a comprehensive and deeper investigation. features in time series can well capture the weak wrist vibra- To fully understand the extent of privacy leakage through tions in response to PIN entries and classify taps leveraging embedded sensors on wearables during the mobile payment machine learning techniques. WristSpy demonstrates that process, we need to address the challenges in the following even wearing the wearable on the non-input hand poses a aspects: 1) The hand movement involved in the passcode input high risk of leaking the PINs. is restricted by the small-sized screen of the mobile device. • We develop a unique differential-based tap-detection scheme Therefore, we need the mm-level accuracy to reconstruct the to capture the weak on-screen taps and a turning-detection fine-grained hand movement trajectories. 2) Reconstructing a scheme to separate the pattern segments based on examining complete passcode from low fidelity wearable sensor readings the physical meanings of key taps and pattern swipes. could encounter large accumulated errors. 3) The freely hand- • Extensive experiments with 15 volunteers and over 1600 held mobile device incurs additional noises and input scenario PIN/pattern entries are conducted to evaluate WristSpy un- uncertainties when recovering the passcode on its keypad. 4) der various input scenarios in mobile payment. We show that The intensity of the taps on the smartphone screen is much WristSpy can achieve up to 92% success rate of inferring smaller than it is with all keyboards. 5) The pattern inference PINs and patterns within five tries and 67% success rate based on non-vision-based technology is still an open area. with only one try. Toward this end, we propose a passcode inference system, II. RELATED WORK named WristSpy, which can infer the user’s passcode inputs on Existing studies such as TouchLogger [10], Accessory [3] the small-sized mobile device screen under different passcode and TapPrints [11] have shown that the inertial sensors (e.g., input scenarios. WristSpy examines the inherent physics mean- accelerometer and gyroscope) on mobile devices can be used ings associated with the user’s taps or pattern swipes when to infer user’s keystroke sequences on the virtual keyboard. fingers are moving on the touchscreen. For two-hand scenarios, However, these studies based on the motion of mobile devices it employs the unique on-screen tap detection scheme and the can hardly recover the input hand trajectory, resulting in turning-detection method to recognize the weak finger taps moderate accuracy. and pattern swipe segments based on the physics concepts Additionally, the powerful embedded sensors on the wear- behind finger tapping and swiping. It then utilizes the co- able devices facilitate revealing the motion information of ordinate alignment method via quaternion to align the two the input hand when the users enter sensitive information on free-moving coordinates of the smartphone and wearable. We real keypads (e.g., real keyboard, ATM keypad) [6], [7], [12]. further build a training-free Euclidean distance-based passcode However, it is still unknown how wearables could leak users’ inference model to leverage the recovered fine-grained hand sensitive mobile payment information entered on the mobile movements and develop two lightweight algorithms without devices, which is a more challenging scenario not covered training, Parallel PIN decoding and Parallel Pattern Inference, by existing approaches but arouses the attackers’ interest. to decode PIN or pattern entries. The algorithms start from ev- Compared with the key clicks on physical keypads, the finger ery possible starting key press simultaneously and recursively taps on mobile devices are confined by small screens and result search for the most likely PIN or pattern entry in parallel in much smaller wrist motion and lighter tapping strength within the model. Additionally, pattern rules are embedded that are hard to be distinguished by the low fidelity motion in the parallel algorithm to guide the right searching path for sensors. Besides, the flexible ways to hold/wear the mobile pattern inference. In the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us