Motion sensors are integrated into all mobile devices, providing information useful for several purposes. However, these sensor data can be read by any application and by websites accessed through a browser, without requiring security permissions. In this paper, we show that information about smartphone movements can lead to the identification of a Personal Identification Number (PIN) tapped by the user. To reduce the amount of sniffed data, we use an event-driven approach, where motion sensors are sampled only when a key is pressed. The acquired data are used to train a machine learning algorithm for the classification of the keystrokes in a supervised manner. We also consider that users insert the same PIN each time authentication is required, leading to further side-channel information available to the attacker. Numerical results show the feasibility of cyber-attacks based on motion sensors. For example, 4-digit PINs are correctly recognized at the first attempt with an accuracy of 37%, and in five attempts with an accuracy of 63%.

Nerini M., Favarelli E., Chiani M. (2023). Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors. IEEE ACCESS, 11, 1-1 [10.1109/ACCESS.2023.3253288].

Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors

Favarelli E.;Chiani M.
2023

Abstract

Motion sensors are integrated into all mobile devices, providing information useful for several purposes. However, these sensor data can be read by any application and by websites accessed through a browser, without requiring security permissions. In this paper, we show that information about smartphone movements can lead to the identification of a Personal Identification Number (PIN) tapped by the user. To reduce the amount of sniffed data, we use an event-driven approach, where motion sensors are sampled only when a key is pressed. The acquired data are used to train a machine learning algorithm for the classification of the keystrokes in a supervised manner. We also consider that users insert the same PIN each time authentication is required, leading to further side-channel information available to the attacker. Numerical results show the feasibility of cyber-attacks based on motion sensors. For example, 4-digit PINs are correctly recognized at the first attempt with an accuracy of 37%, and in five attempts with an accuracy of 63%.
2023
Nerini M., Favarelli E., Chiani M. (2023). Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors. IEEE ACCESS, 11, 1-1 [10.1109/ACCESS.2023.3253288].
Nerini M.; Favarelli E.; Chiani M.
File in questo prodotto:
File Dimensione Formato  
Machine_Learning_for_PIN_Side-Channel_Attacks_Based_on_Smartphone_Motion_Sensors.pdf

accesso aperto

Descrizione: articolo
Tipo: Versione (PDF) editoriale
Licenza: Creative commons
Dimensione 1.15 MB
Formato Adobe PDF
1.15 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/965613
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact