کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
457048 695873 2016 16 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript
ترجمه فارسی عنوان
امضاهای لمسی: شناسایی عملکردهای لمسی کاربر و PIN ها براساس اطلاعات حسگر تلفن همراه از طریق جاوا اسکریپت
کلمات کلیدی
سنسور های تلفن همراه. حمله جاوا اسکریپت. مرورگرهای موبایل؛ امنیت موبایل؛ اقدامات لمسی؛ پین ها
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user security and privacy are however not considered in W3C specifications. In this work, for the first time, we show how user security can be compromised using these sensor data via browser, despite that the data rate is 3–5 times slower than what is available in app. We examine multiple popular browsers on Android and iOS platforms and study their policies in granting permissions to JavaScript code with respect to access to motion and orientation sensor data. Based on our observations, we identify multiple vulnerabilities, and propose TouchSignatures which implements an attack where malicious JavaScript code on an attack tab listens to such sensor data measurements. Based on these streams, TouchSignatures is able to distinguish the user's touch actions (i.e., tap, scroll, hold, and zoom) and her PINs, allowing a remote website to learn the client-side user activities. We demonstrate the practicality of this attack by collecting data from real users and reporting high success rates using our proof-of-concept implementations. We also present a set of potential solutions to address the vulnerabilities. The W3C community and major mobile browser vendors including Mozilla, Google, Apple and Opera have acknowledged our work and are implementing some of our proposed countermeasures.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Information Security and Applications - Volume 26, February 2016, Pages 23–38
نویسندگان
, , , ,