2
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      SonarSnoop: Active Acoustic Side-Channel Attacks

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device. For example, a victim's finger movements can be inferred to steal Android phone unlock patterns. In our empirical study, the number of candidate unlock patterns that an attacker must try to authenticate herself to a Samsung S4 Android phone can be reduced by up to 70% using this novel acoustic side-channel. Our approach can be easily applied to other application scenarios and device types. Overall, our work highlights a new family of security threats.

          Related collections

          Most cited references5

          • Record: found
          • Abstract: not found
          • Article: not found

          See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

                Bookmark

                Author and article information

                Journal
                30 August 2018
                Article
                1808.10250
                ef7f03d1-0066-442e-a1a7-111584619186

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article