A Video-based Attack for Android Pattern Lock

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Chen, Xiaojiang and Wolff, Willy and Aviv, Adam and Wang, Zheng (2018) A Video-based Attack for Android Pattern Lock. ACM Transactions on Privacy and Security, 21 (4).

[img]
Preview
PDF (PDF29460441-549292099)
PDF29460441_549292099.pdf - Submitted Version
Available under License Creative Commons Attribution.

Download (1MB)
[img]
Preview
PDF (tops18)
tops18.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (1MB)

Abstract

Pattern lock is widely used for identification and authentication on Android devices. This article presents a novel video-based side channel attack that can reconstruct Android locking patterns from video footage filmed using a smartphone. As a departure from previous attacks on pattern lock, this new attack does not require the camera to capture any content displayed on the screen. Instead, it employs a computer vision algorithm to track the fingertip movement trajectory to infer the pattern. Using the geometry information extracted from the tracked fingertip motions, the method can accurately infer a small number of (often one) candidate patterns to be tested by an attacker. We conduct extensive experiments to evaluate our approach using 120 unique patterns collected from 215 independent users. Experimental results show that the proposed attack can reconstruct over 95% of the patterns in five attempts. We discovered that, in contrast to most people’s belief, complex patterns do not offer stronger protection under our attacking scenarios. This is demonstrated by the fact that we are able to break all but one complex patterns (with a 97.5% success rate) as opposed to 60% of the simple patterns in the first attempt. We demonstrate that this video-side channel is a serious concern for not only graphical locking patterns but also PIN-based passwords, as algorithms and analysis developed from the attack can be easily adapted to target PIN-based passwords. As a countermeasure, we propose to change the way the Android locking pattern is constructed and used. We show that our proposal can successfully defeat this video-based attack. We hope the results of this article can encourage the community to revisit the design and practical use of Android pattern lock.

Item Type:
Journal Article
Journal or Publication Title:
ACM Transactions on Privacy and Security
Additional Information:
© ACM, 2018. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Privacy and Security (TOPS) http://dx.doi.org/10.1145/3230740
ID Code:
125681
Deposited By:
Deposited On:
04 Jun 2018 10:38
Refereed?:
Yes
Published?:
Published
Last Modified:
27 Sep 2020 04:35