informing guessing attacks on publicly
play

Informing Guessing Attacks on Publicly Performed Secrets Laura - PowerPoint PPT Presentation

Informing Guessing Attacks on Publicly Performed Secrets Laura South Mentors: Janne Lindqvist & Gradeigh Clark July 2017 Motivation Experimental setup Outline Simple patterns Complex patterns Next steps Motivation Research


  1. Informing Guessing Attacks on Publicly Performed Secrets Laura South Mentors: Janne Lindqvist & Gradeigh Clark July 2017

  2. Motivation Experimental setup Outline Simple patterns Complex patterns Next steps

  3. Motivation • Research question: can information about passwords be obtained by observing a person unlock a mobile device at a distance? • Similar efforts in recent research: • Focused on hand/finger observation at close distance where device is observable (Ye et al., 2017) • Used other methods (accelerometer) to obtain information from publicly performed secrets (Owusu, Han, Das, Perrig, & Zhang, 2012)

  4. Experimental Setup Step 1: Camera work • Two camera orientations Side: Back: • Two tracking points • side orientation: elbow & wrist • back orientation: elbow & shoulder

  5. Experimental Setup Step 2: Motion tracking • Software: Kinovea (open source video analysis)

  6. Experimental Setup Step 3: Data visualization XML Java R Output from motion Extracts tracking info Creates plot using tracking software from XML, discards the information from Java rest program

  7. How to read a movement plot Gesture performed: Starting Point

  8. Simple patterns Pattern Direction Direction performed of wrist of elbow motion motion Up up-right down-right Down down-left up-left Left up-right down-right Right down-left up-left

  9. Simple patterns • Side orientation • Four diagonal movements (upleft downright, upright, downleft)

  10. Moving on to more complex patterns 3 4 4 2 3 1 Pattern performed Direction of wrist movement Up up-right Down down-left 2 1 Left up-right Right down-left

  11. Next steps • 3D depth sensing using Project Tango tablet or Kinect • Differentiate more clearly between “up” vs. “left” and “down” vs. “right" • Analyze data from back orientation • Expand dataset to include a more diverse group of subjects • Create movement classifier

  12. Acknowledgements

  13. References 1. Owusu, E., Han, J., Das, S., Perrig, A., & Zhang, J. (2012, February). ACCessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (p. 9). ACM. 2. Ye, G., Tang, Z., Fang, D., Chen, X., Kim, K. I., Taylor, B., & Wang, Z. (2017, January). Cracking Android pattern lock in five attempts. In The Network and Distributed System Security Symposium .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend