Smartphone Password Vulnerability Discovered

A study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone’s PIN code, using the phone’s physical sensors data.

Sensors in smartphones, like the accelerometer, gyroscope and proximity sensors represent a potential security vulnerability, according to electronics360.globalspec.com.

With a combination of information that was gathered from six different sensors from smartphones and state-of-the-art machine learning and deep learning algorithms, the researchers from NTU have succeeded in unlocking smartphones using the Android operating system with 99.5 percent accuracy within three tries when attempting to unlock a phone with one of the 50 most common PIN numbers.

Before this latest study, the best phone-cracking success rate was 74 percent for the 50 most common PIN numbers, but NTU’s technique can be used to guess all 10,000 possible combinations of four-digit PINs.

The team was led by Dr. Shivam Bhasin, senior research scientist at the Temasek Laboratories at NTU. The researchers used sensors in a smartphone to model which number had been pressed by the owner, based on how the phone was tilted and how much light is blocked by the thumb or fingers. 

The team took Android phones and installed a custom application that collected data from six sensors: accelerometer, gyroscope, magnetometer, proximity sensor, barometer and ambient light sensor. “When you hold your phone  and key in the PIN, the way the phone moves when you press one, five, or nine, is very different.  Likewise, pressing one with your right thumb will block more light than if you pressed nine,” explains Dr. Bhasin, who spent 10 months with his colleagues, Mr. David Berend and Dr. Bernhard Jungk, on the project.

The classification algorithm was trained with data that was collected from three people who each entered a random set of 70 four-digit pin numbers on a phone. At the same time, it recorded the relevant sensor reactions.

Using deep learning, the classification algorithm was able to give different weights of importance to each of the sensors, depending on how sensitive each was to the different numbers being pressed. This helps eliminate factors that it believes is less important and increases the success rate for PIN retrieval.

Even though each individual enters the security PIN on their phone differently, the scientists show that as data from more people is fed to the algorithm, success rates are improved.

While a malicious application might not be able to guess a PIN correctly right after installation, with machine learning it could collect data from thousands of users over time from each of their phones to learn their PIN entry pattern and then launch an attack later when the success rate is much higher.

Professor Gan Chee Lip, Director of the Temasek Laboratories at NTU, said this study shows how devices with seemingly strong security can be attacked with a side-channel, as a sensor data could be diverted by malicious applications to spy on user behavior and help access PIN, password information and more. “Along with the potential for leaking passwords, we are concerned that access to phone sensor information could reveal far too much about a user’s behavior. This has significant privacy implications that both individuals and enterprises should pay urgent attention to,” said Lip.

Dr. Bhasin believes it would be advisable for mobile operating systems to restrict access to the six sensors in the future so that users can actively choose to give permissions only to trusted apps that need them.

In order to keep your mobile devices secure, Dr. Bhasin says that users should have PINs with more than four digits with other authentication methods like one-time passwords, two-factor authentication and fingerprint or facial recognition.

I-HLS

You Might Also Read:

Mobile Battery Tracks You Online:

No Phone Is Safe from Hackers & Spies:
 

 

« GDPR Requirements, Deadlines And Facts
A Cyberattack Could Lead To A Nuclear Strike »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.