A Copenhagen computer engineering student has demonstrated a technique that could allow attackers to steal keypad login credentials by tracking a user’s hand movements using malicious code running on a smartwatch.
The technique, detailed in a master’s thesis by French student Tony Beltramelli at the University of Copenhagen, builds on earlier work by Romit Roy Choudhury, associate professor at the Department oF Electrical and Computer Engineering of the University of Illinois, who last year demonstrated how a Samsung Gear Live smartwatch’s motion sensors could be used to log a user’s keystrokes on a standard computer keyboard.
“The goal of this work is to raise awareness about the potential risks related to motion sensors built into wearable devices and to demonstrate abuse opportunities leveraged by advanced neural network architectures,” Beltramelli wrote (PDF) in the thesis, titled “Deep-Spying: Spying using Smartwatch and Deep Learning”.
He built a customised application running on a Sony SmartWatch 3 to record accelerometer and gyroscope data, which was transmitted via Bluetooth to a nearby LG Nexus 4 Android device, and then to a server for analysis.
The server-side code used a machine learning algorithm called RNN-LSTM, or Recurrent Neural Network – Long Short-Term Memory, to guess what characters were being entered based on the recorded movements. The algorithm has in the past been used in computer-vision and language processing.
He said the architecture is currently able to achieve a maximum accuracy of 73 percent for touch-screen entry and 59 percent for keypad entry. In a video, the system is demonstrated guessing five out of eight characters correctly.
Beltramelli said such a system could be trained to detect keystrokes with a high degree of accuracy from a wide variety of keypads. He said similar systems could be used to crack gesture-based lock screens.
Such an attack would in theory rely on a user being tricked into installing malicious software on a smartwatch. Researchers have, however, demonstrated flaws in the Android mobile operating system that would allow the installation of malicious code with no user interaction. Research published last summer found numerous security flaws in Android-based smartwatches including the Sony SmartWatch and Samsung Gear Live.
“These observations imply that a cyber-criminal would be able, in theory, to eavesdrop on any device operated by the user while wearing a WAD (Wearable Wristband and Armband Device),” Beltramelli wrote.
He suggested users could protect themselves by wearing such devices on the hand they don’t use to enter sensitive keypad data.
Are you a security pro? Try our quiz!
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…