skip to main content
10.5555/1925004.1925009guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Smudge attacks on smartphone touch screens

Authors Info & Claims
Published:09 August 2010Publication History

ABSTRACT

Touch screens are an increasingly common feature on personal computing devices, especially smartphones, where size and user interface advantages accrue from consolidating multiple hardware components (keyboard, number pad, etc.) into a single software definable user interface. Oily residues, or smudges, on the touch screen surface, are one side effect of touches from which frequently used patterns such as a graphical password might be inferred.

In this paper we examine the feasibility of such smudge attacks on touch screens for smartphones, and focus our analysis on the Android password pattern. We first investigate the conditions (e.g., lighting and camera orientation) under which smudges are easily extracted. In the vast majority of settings, partial or complete patterns are easily retrieved. We also emulate usage situations that interfere with pattern identification, and show that pattern smudges continue to be recognizable. Finally, we provide a preliminary analysis of applying the information learned in a smudge attack to guessing an Android password pattern.

References

  1. Android 2.2 platform highlights. http:// developer.android.com/sdk/android-2.2- highlights.html.Google ScholarGoogle Scholar
  2. D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In USENIX Sec'04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. M. DeAlvare. A framework for password selection. In UNIX Security Workshop II, 1998.Google ScholarGoogle Scholar
  4. H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu. Yagp: Yet another graphical password strategy. Computer Security Applications Conference, Annual, 0:121-129, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Gutta, J. R. Huang, H. Wechsler, and B. Takacs. Automated face recognition. volume 2938, pages 20-30. SPIE, 1997.Google ScholarGoogle Scholar
  6. D. L. Hall and J. Llinas. An introduction to multisensory data fusion. Proc. IEEE, 85(1), January 1997.Google ScholarGoogle Scholar
  7. F. Hunter and P. Fuqua. Light: Science and Magic: An Introduction to Photographic Lighting. Focal Press, 1997.Google ScholarGoogle Scholar
  8. S. Impedovo, L. Ottaviano, and S. Occhinegro. Optical character recognition - a survey. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 5(1-2):1-24, 1991.Google ScholarGoogle Scholar
  9. R. Jenkins and A. Burton. 100% accuracy in automatic face recognition. Science, 319(5862):435, January 2008.Google ScholarGoogle Scholar
  10. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX Sec'99, pages 1-1, Berkeley, CA, USA, 1999. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. V. Klein. Foiling the cracker: A survey of, and improvements to, password security. In USENIX Sec'90, 1990.Google ScholarGoogle Scholar
  12. B. Laxton, K. Wang, and S. Savage. Reconsidering physical key secrecy: Teleduplication via optical decoding. In CCS, October 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Mantas. An overview of character recognition methodologies. Pattern Recognition, 19(6):425-430, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Mori, H. Nishida, and H. Yamada. Optical Character Recognition. John Wiley & Sons, Inc., New York, NY, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Morris and K. Thompson. Password security: a case history. Communications of the ACM, 22(11):594-597, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Renaud and A. D. Angeli. Visual passwords: Cure-all or snake-oil. Communications of the ACM, 52(12):135-140, December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable sapce of graphical passwords. In USENIX Sec'04, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Thorpe and P. C. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In USENIX Sec'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Zalewski. Cracking safes with thermal imaging, 2005. http://lcamtuf.coredump.cx/tsafe/.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image Guide Proceedings
    WOOT'10: Proceedings of the 4th USENIX conference on Offensive technologies
    August 2010
    74 pages

    Publisher

    USENIX Association

    United States

    Publication History

    • Published: 9 August 2010

    Qualifiers

    • Article