2016
DOI: 10.1515/popets-2016-0020
|View full text |Cite
|
Sign up to set email alerts
|

Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards

Abstract: We present a new side-channel attack against soft keyboards that support gesture typing on Android smartphones. An application without any special permissions can observe the number and timing of the screen hardware interrupts and system-wide software interrupts generated during user input, and analyze this information to make inferences about the text being entered by the user. System-wide information is usually considered less sensitive than app-specific information, but we provide concrete evidence that thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…Researchers in [23] evaluate the use of screen interrupts (context-switches) that occur within the Android OS during gesture typing. They find that pauses in typing gestures can be identified via the interrupt frequency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers in [23] evaluate the use of screen interrupts (context-switches) that occur within the Android OS during gesture typing. They find that pauses in typing gestures can be identified via the interrupt frequency.…”
Section: Related Workmentioning
confidence: 99%
“…: by requiring the scheme to be trained on a word before it can be authenticated [5]. In [23] the authors investigate gesture-typing but focus on word identification rather than providing an authentication scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Likewise, with the rapid advancements in mobile technology, researchers have been able to demonstrate even more sophisticated SCAs compromising smartphones (Spreitzer et al, 2016;Song et al, 2016;Sarwar et al, 2013;Owusu et al, 2012;Lange et al, 2011). For instance, new attacks (Simon et al, 2016;Aviv et al, 2012;Xu et al, 2012;Cai and Chen, 2011) enable adversaries to deduce keyboard input on touchscreens through "sensor readings from native apps" (Spreitzer et al, 2016;Kambourakis et al, 2016;Aviv et al, 2012). Because typing on various places on the screen creates different vibrations, data from Motion (Cai and Chen, 2011), a SCA on touch screen smartphones with soft keyboards data, can be employed by an attacker to deduce the keys being typed.…”
Section: Background and Related Workmentioning
confidence: 99%
“…These timings show characteristic patterns of the user, which depend on several factors such as keystroke sequences on the level of single letters, bigrams, syllables or words as well as keyboard layout and typing experience [37]. Existing attacks train probabilistic classifiers like hidden Markov models or neural networks to infer known words or to reduce the password-guessing complexity [42,43,53].…”
Section: Keystroke Timing Attacksmentioning
confidence: 99%