Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243777
|View full text |Cite
|
Sign up to set email alerts
|

PatternListener

Abstract: Pattern lock has been widely used for authentication to protect user privacy on mobile devices (e.g., smartphones and tablets). Several attacks have been constructed to crack the lock. However, these approaches require the attackers to either be physically close to the target device or be able to manipulate the network facilities (e.g., WiFi hotspots) used by the victims. Therefore, the effectiveness of the attacks is significantly impacted by the environment of mobile devices. Also, these attacks are not scal… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…The recorded audio undergoes processing, removing static noise, and is then used for calculations to measure relative movement and infer pattern lines. The inferred pattern lines are used to generate candidate patterns, which are ranked and provided to the attacker [11] [59].…”
Section: Rq1: What Are the Existing Security Attacks On Graphical Pas...mentioning
confidence: 99%
See 1 more Smart Citation
“…The recorded audio undergoes processing, removing static noise, and is then used for calculations to measure relative movement and infer pattern lines. The inferred pattern lines are used to generate candidate patterns, which are ranked and provided to the attacker [11] [59].…”
Section: Rq1: What Are the Existing Security Attacks On Graphical Pas...mentioning
confidence: 99%
“…• Restricting Microphone Usage: One approach to mitigating sonar attacks is to restrict microphone usage in the background during pattern drawing [59]. By limiting access to the microphone, acoustic signals cannot be captured, preventing attackers from determining fingertip motions on the screen.…”
Section: ) Sonar Attackmentioning
confidence: 99%
“…Similarly, KeyListener [39] performs KI on touchscreen based on different attenuation of the signals (generated by phone speaker) at the two microphones. PatternListener [73] compromises pattern locks by using acoustic signals reflected from fingertips to measure their relative movement and infer the pattern lines. These methods can be deemed as acoustic version of OKI.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile devices (e.g., smartphones and tablets), along with their software applications, have been increasingly adopted to identify human users in modern societies [5,17]. Consequently, stealing passwords from these devices becomes almost like identify theft, hence attracting diversified eavesdropping attacks, either direct [42,70] or indirect [2,36,37,43,53,69,73]. Bearing no need to have a visual on the target screen, the indirect attacks often incur a much higher risk as they leverage side-channels to infer passwords in a stealthy manner.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation