Just In
- 7 hrs ago OPPO Find X7 Ultra Camera Deep-Dive: Pushing the Boundaries of Photography on a Smartphone
- 9 hrs ago iQOO Z9 Turbo Launched in China: Snapdragon 8s Gen 3, 16GB RAM, and More
- 9 hrs ago iQOO Z9, Z9x Launched in China: 6000mAh Battery, iQOO 12 Inspired Design, 50MP Camera, & More
- 10 hrs ago HMD Branded First Set of Android Smartphones Are Here!
Don't Miss
- Education JEE Main Result 2024 Out, Telangana's 15 Toppers Shine, Check Statewise List of 56 Candidates with Perfect 100
- Sports Who Won Yesterday's IPL Match 40? DC vs GT, IPL 2024 on April 24: Delhi Capitals Clinch High-Scoring Thriller At Kotla
- News Mangalsutra Row: Did Indira Gandhi Donate Gold During The 1962 War? The Facts Behind Priyanka's Claim
- Movies Kota Factory 3 OTT Release Date, Platform: When Will Jitendra Kumar's Web Series Premiere On Netflix?
- Lifestyle Backless Dress: 7 Tips For Choosing Perfect Bra For Backless Outfits And Turn Heads Wherever You Go
- Travel Escape to Kalimpong, Gangtok, and Darjeeling with IRCTC's Tour Package; Check Itinerary
- Finance DCB Bank Q4 Results: PAT Grew 9% To Rs 156 Cr, NII Jumps 4.5%; Dividend Declared
- Automobiles Aston Martin Vantage Launched In India At Rs 3.99 Crore
Smartphone sensors can be used by hackers to access your PIN number
Using a combination of information gathered from six different sensors found in smartphones and machine learning and deep learning algorithms, the researchers succeeded in unlocking the smartphone.
While data security has always been a major concern in the tech and the cyber world, instruments in smartphones such as the accelerometer, gyroscope and proximity sensors can be a potential security vulnerability according to a study. Researchers, including one of Indian-origin, have now found that data from these sensors could be used by hackers to guess the security PIN and unlock it.
Using a combination of information gathered from six different sensors found in smartphones and machine learning and deep learning algorithms, the researchers succeeded in unlocking Android smartphones with a 99.5 percent accuracy within only three tries, said the study.
The researchers believe their work, published in the journal Cryptology ePrint Archive, highlights a significant flaw in smartphone security, as using the sensors within the phones require no permissions to be given by the phone user and are openly available for all apps to access.
Led by Shivam Bhasin of Nanyang Technological University, Singapore (NTU Singapore), the researchers used sensors in a smartphone to model which number had been pressed by its users, based on how the phone was tilted and how much light is blocked by the thumb or fingers.
The team of researchers took Android phones and installed a custom application which collected data from six sensors: accelerometer, gyroscope, magnetometer, proximity sensor, barometer and ambient light sensor.
"When you hold your phone and key in the PIN, the way the phone moves when you press 1, 5 or 9, is very different. Likewise, pressing 1 with your right thumb will block more light than if you pressed 9," Bhasin said.
The classification algorithm was trained with data collected from a group of people, who each entered a random set of 70 four-digit PIN numbers on a phone. At the same time, it recorded the relevant sensor reactions.
Known as deep learning, the classification algorithm was able to give different weightings of importance to each of the sensors, depending on how sensitive each was to the different numbers being pressed. Although each individual enters the security PIN on their phone differently, the scientists showed that as data from more people is fed to the algorithm over time, success rates improved.
So while a malicious application may not be able to correctly guess a PIN immediately after installation, using machine learning, it could collect data from thousands of users over time from each of their phones to learn their PIN entry pattern and then launch an attack later when the success rate is much higher.
This study shows how devices with seemingly strong security can be attacked using a side-channel, as sensor data could be diverted by malicious applications to spy on user behavior and help to access PIN and password information, and more, said Professor Gan Chee Lip, Director of the Temasek Laboratories at NTU.
The researchers said mobile operating systems should restrict access to the six sensors in future so that users can actively choose to give permissions only to trusted apps that need them.
Inputs from IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
11,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804