RandomPad: Usability of Randomized Mobile Keypads for Defeating - - PowerPoint PPT Presentation

randompad usability of randomized mobile keypads for
SMART_READER_LITE
LIVE PREVIEW

RandomPad: Usability of Randomized Mobile Keypads for Defeating - - PowerPoint PPT Presentation

RandomPad: Usability of Randomized Mobile Keypads for Defeating Inference Attacks Saturday 29th April, 2017. IMPS 2017, Paris, France. Anindya Maiti , Kirsten Crager , Murtuza Jadliwala , Jibo He , Kevin Kwiat and Charles


slide-1
SLIDE 1

RandomPad: Usability of Randomized Mobile Keypads for Defeating Inference Attacks

Saturday 29th April, 2017. IMPS 2017, Paris, France. Anindya Maiti†, Kirsten Crager†, Murtuza Jadliwala†, Jibo He†, Kevin Kwiat⋄ and Charles Kamhoua⋄

†Wichita State University, Wichita, KS, USA ⋄Air Force Research Laboratory, Rome, NY, US

slide-2
SLIDE 2

Table of Contents

  • 1. Introduction
  • 2. Randomization Strategies
  • 3. Human Factors
  • 4. Study
  • 5. Evaluation
  • 6. Discussions and Conclusion

2

slide-3
SLIDE 3

Introduction

slide-4
SLIDE 4

Side-Channel Inference Attacks on Mobile Device Keypads

Indirect observation techniques used by ‘attackers’ to obtain victim’s personal information (such as passwords, credit card details, SSN/NIR, etc.) from their typing actions.

4

slide-5
SLIDE 5

Types of Keystroke Inference Attacks 1/2

Based on time delays between audio feedback of keystrokes [8]. Sun et al. [29] used video recordings of the backside of a tablet to infer typed keystrokes. Simon et al. [24] used microphone to detect touch events, while the camera is used to estimate the smartphone’s orientation, and correlate it to the position of the digit tapped by user. Zhang et al. [33] analyzed finger smudges left on the touch screen surface to infer touch patterns, with remarkable success.

5

slide-6
SLIDE 6

Types of Keystroke Inference Attacks 2/2

Motion sensor-based attacks on mobile keypads:

  • On-Device: Cai et al. [4] and Owusu et al. [18] used

accelerometer and gyroscope for keystroke inference.

  • Off-Device: Maiti et al. [17] used user’s smartwatch motion

sensors for keystroke inference.

6

slide-7
SLIDE 7

How to Protect Smartphone Keystroke Privacy?

Interestingly, all these attacks share one common assumption: the numeric keypad employed by the target user has a standardized key layout known to the adversary. Solution: Randomizing the keyboard layout from the default to something different.

7

slide-8
SLIDE 8

Randomization Strategies

slide-9
SLIDE 9

Randomization Strategies

We propose five representative strategies spanning from purely-random to partially-random keypad layouts. The latter preserves some characteristics of the default layout, to achieve a favorable security-usability trade-off. For stronger security, keypad randomization can be performed either at the beginning of every keystroke or at the beginning of each typing session.

9

slide-10
SLIDE 10

Randomization Strategies - Sequence Randomization

(a) (b) (c)

Figure 1: Examples of (a) Row Randomization (RR), (b) Column Randomization (CR), and (c) Individual Key Randomization (IKR)

10

slide-11
SLIDE 11

Randomization Strategies - Size and Location Randomization

(a) (b) (c)

Figure 2: Examples of (a) Key Size Randomization (KSR) and (b) Key Location Randomization (KLR), and (c) The hidden 7 × 6 grid layout used in KSR and KLR.

11

slide-12
SLIDE 12

Security Analysis of the Randomization Strategies

Table 1: Security assurance of the five proposed randomization

  • strategies. Lower rank is better security.

Randomization Strategy Correct Entire Keypad Guessing Probability Security Assurance Rank IKR

1 12! = 2.08 × 10−9

1 RR

1 4! = 0.04167

2 KLR

1 16 = 0.0625

3 KSR

1 12 = 0.08333

4 CR

1 3! = 0.16667

5

12

slide-13
SLIDE 13

Human Factors

slide-14
SLIDE 14

Design Principles Against Side-Channel Attacks

Cai et al. [5] pointed out the following desirable properties in any defense solution:

  • Security: solution must protect against side-channel attacks,
  • Usability: ideally, solution should require no extra effort from

users and if extra effort is unavoidable, it should not disrupt the users’ work flow,

  • Backward and Forward Compatibility: no or minimal

modification to existing applications and operating systems,

  • Performance: no or minimal overhead, and
  • Versatility: should be deployable on various types of mobile

hardware, software, and user interfaces.

14

slide-15
SLIDE 15

Evaluation Goals

Time required for completing a typing task and the number of errors made during the task, while using RandomPad. User-provided subjective workload and usability measures using NASA-TLX [10] and SUS [3]. Effect of additional visual cues in form of contrasting shades of gray [13][30] to represent each of the keys.

15

slide-16
SLIDE 16

Study

slide-17
SLIDE 17

Study - Participants

Table 2: Demographics and preferences of 100 participants. Gender 56% Female 44% Male Occupation 33% Employed 67% Student Smartphone Ownership Duration 26% Less than 5 Years 74% More than 5 Years Current Smartphone 59% iOS (iPhone) 41% Android Willingness to Use Random Keypad (Before Study) 22% In Favor 78% Not in Favor

17

slide-18
SLIDE 18

Study - Task

Dictated Typing

  • Visually and acoustically dictated sequences of pseudo-random

single digit numbers.

  • Repeated for default, randomized and gray-scale keypads.

Natural Typing

  • Participants were instructed to type information already

known to them such as zip code (5 digits), phone number without area code (7 digits), birth date (8 digits), etc.

  • Repeated for default, randomized and gray-scale keypads.

18

slide-19
SLIDE 19

Evaluation

slide-20
SLIDE 20

Results - Typing Speed

500.0 600.0 700.0 800.0 900.0 1000.0 1100.0 CR IKR KLR KSR RR AVERAGE TYPING TIME (MS) RANDOMIZATION TYPE Default Randomized Gray-scale 500.0 600.0 700.0 800.0 900.0 1000.0 1100.0 CR IKR KLR KSR RR AVERAGE TYPING TIME (MS) RANDOMIZATION TYPE Default Randomized Gray-scale

Randomized keypads do increase task completion times, by approximately 21% for dictated and 16% for natural typing. CR < KLR < RR < IKR < KSR

20

slide-21
SLIDE 21

Results - Typing Accuracy

90.0 91.0 92.0 93.0 94.0 95.0 96.0 97.0 98.0 99.0 100.0 CR IKR KLR KSR RR ACCURACY (%) RANDOMIZATION TYPE Default Randomized Gray-scale 90.0 91.0 92.0 93.0 94.0 95.0 96.0 97.0 98.0 99.0 100.0 CR IKR KLR KSR RR ACCURACY (%) RANDOMIZATION TYPE Default Randomized Gray-scale

It may be concluded that the task completion time was traded-off for higher accuracy by the participants.

21

slide-22
SLIDE 22

Results - Learning Curve

In order to analyze if the typing performance (speed and accuracy) improves with more usage of the randomized keypad, we compare the average per key typing time for the first and last ten numbers typed with RandomPad, in the natural typing session. The overall mean drop in per key typing time is recorded as −163.09 ms, with p < 0.001. However, we did not observe any significant improvement in accuracy.

22

slide-23
SLIDE 23

Results - Perceived Workload

0.0 10.0 20.0 30.0 40.0 50.0 60.0 CR IKR KLR KSR RR NASA-TLX SCORE RANDOMIZATION TYPE Default Randomized Gray-scale

KLR is reported to take the least effort compared to the other four randomization strategies on the NASA-TLX. KLR < CR < IKR < KSR < RR

23

slide-24
SLIDE 24

Results - Perceived Usability

0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0 CR IKR KLR KSR RR SUS SCORE RANDOMIZATION TYPE Default Randomized Gray-scale

KLR is again reported to be the most usable compared to the

  • ther four randomization strategies on the SUS.

KLR > CR > IKR > KSR > RR

24

slide-25
SLIDE 25

Results - Gray-Scale

On the NASA-TLX and SUS scores, there are no significant differences between the randomized keypads without gray-scale shading versus randomized keypads with gray-scale shading Thus, contrasting gray-scale shades on the keypad does not lower the perceived workload or improve the perceived usability of RandomPad. However, gray-scale keypads could be potentially improved by adjusting and optimizing this contrast between the different shades [34].

25

slide-26
SLIDE 26

Results - Are Users Going to Use it?

In the initial pre-survey recorded before the participants were introduced to side-channel keystroke inference attacks, only 22%

  • f the participants reported that they would be willing to use a

randomized version of the keypad. After completing the experimental trials, as many as 80% of the participants reported in the post-survey that they would be willing to use a randomized keypad in order to protect their privacy.

26

slide-27
SLIDE 27

Discussions and Conclusion

slide-28
SLIDE 28

Privacy-Usability Trade-Off 1/2

Table 3: Usability rankings of the five randomization strategies calculated using average typing speed, workload (lower better) and perceived usability (higher better). Lower least rank is better usability. Randomi- zation Strategy Typing Speed Rank Workload Rank Perceived Usability Rank Summed Usability Rank (Least Rank) KLR 2 1 1 4 (1) CR 1 2 2 5 (2) IKR 4 3 3 10 (3) KSR 5 4 4 13 (4) RR 3 5 5 13 (4)

28

slide-29
SLIDE 29

Privacy-Usability Trade-Off 2/2

Comparing Table 1 (Security Analysis) and 3 (Usability Analysis), we see that KLR ranks relatively highest on both (3 + 1 = 4) tied with IKR (1 + 3 = 4), followed by RR (2 + 4 = 6), CR (5 + 2 = 7), and KSR (4 + 4 = 8), respectively. In other words, KLR and IKR provides the best balance between security and usability, while KSR provides the least.

29

slide-30
SLIDE 30

Future Work

Prevent visual channel attacks using randomized augmented reality keyboards (PerCom’17 Workshop). Publicly available RandomPad plug-in for Android smartphones.

30

slide-31
SLIDE 31

Conclusion

We proposed the use of randomized keypads for typing sensitive information on mobile device keypads. Increased task completion time. Perceived to be less usable and more work. However, the learning curve associated with randomized keypads can improve user performance and usability with prolonged use. Interestingly, even with the degraded usability of randomized keypads, participants were willing to use it for improved privacy.

31

slide-32
SLIDE 32

Appendix

slide-33
SLIDE 33

Challenges in Protection Against Side-Channel Attacks

Zero-permission sensors. Adding all-sensor access control imposes high security-usability trade-off. Also, requires significant OS and app modifications. Biometric sensors (which require specialized hardware), works only for authentication. No universal defense mechanism against off-device inference attacks.

33

slide-34
SLIDE 34

Protection by Randomization

ScrambleKeypad [26] for electronic door access control systems. Limited flexibility in terms of available set of randomization

  • strategies. Fixed security-usability trade-off.

We propose, implement, and comprehensively evaluate different randomized keypads (or RandomPad) for mobile devices.

34

slide-35
SLIDE 35

How to Protect Smartphone Keystroke Privacy? 2/2

Two new challenges:

  • Users may be uncomfortable typing on a keypad different from

the one they are habituated to, and

  • As the keypad changes randomly, users will always face an

unfamiliar keypad. Our Research: We comprehensively assess the usability and perceived workload of typing on keypads generated by different randomization strategies with the help of actual typing experiments involving a diverse set of 100 human subjects.

35