Now Reading
Research shows smartphone sensors leave trackable fingerprints

Research shows smartphone sensors leave trackable fingerprints

Example demonstrating how accelerometer data shared with separate traffic and health applications could indicate Bob's location. - See more at: http://www.ece.illinois.edu/mediacenter/article.asp?id=7897#sthash.QGpqmL9Q.dpuf
Example demonstrating how accelerometer data shared with separate traffic and health applications could indicate Bob’s location. – See more at: http://www.ece.illinois.edu/mediacenter/article.asp?id=7897#sthash.QGpqmL9Q.dpuf

 

“That’s a serious threat.”
  • Research by Associate Professor Romit Roy Choudhury and graduate students Sanorita Dey and Nirupam Roy have demonstrated that the accelerometers used in mobile devices posses unique, trackable fingerprints.
  • This suggests that even when a smartphone application doesn’t ask for geospatial information (“…would like to use your current location”), there are other surreptitious means of extracting that information.
  • These fingerprints stem from subtle idiosyncrasies in device manufacturing and are reflected in the unprotected data shared with numerous applications.

Fingerprints — those swirling residues left on keyboards and doorknobs — are mostly invisible. They can affirm your onetime presence, but they cannot be used to track your day-to-day activities.

They cannot tell someone in real time that after exercising at the gym, you went to office in a bus and played video games during lunch. But what if our hand-held electronics are leaving real-time fingerprints instead? Fingerprints that are so intrinsic to the device that, like our own, they cannot be removed?

Research by Associate Professor Romit Roy Choudhury and graduate students Sanorita Dey and Nirupam Roy has demonstrated that these fingerprints exist within smartphone sensors, mainly because of imperfections during the hardware manufacturing process.

In some ways, it’s like cutting out sugar cookies. Even using the same dinosaur-shaped cutter, each cookie will come out slightly different: a blemish here, a pock there. For smartphone sensors, these imperfections simply occur at the micro- or nanoscale.

Their findings were published at the Network and Distributed System Security Symposium (NDSS), a major conference on wireless and web security, held last February in San Diego. The research also won the best poster award at the HotMobile international workshop in 2013.

Other collaborators on this project are Professors Srihari Nelakuditi and Wenyuan Xu at the University of South Carolina (USC). Roy and Dey completed their master’s degrees at USC, where they jointly won the Outstanding Thesis Award.

In the study, the researchers focused specifically on the accelerometer, a sensor that tracks three-dimensional movements of the phone — essential for countless applications, including pedometers, sleep monitoring, mobile gaming — but their findings suggest that other sensors could leave equally unique fingerprints.

“When you manufacture the hardware, the factory cannot produce the identical thing in millions,” Roy said. “So these imperfections create fingerprints.”

Of course, these fingerprints are only visible when accelerometer data signals are analyzed in detail. Most applications do not require this level of analysis, yet the data shared with all applications — your favorite game, your pedometer — bear the mark. Should someone want to perform this analysis, they could do so.

The researchers tested more than 100 devices over the course of nine months: 80 standalone accelerometer chips used in popular smartphones, 25 Android phones, and 2 tablets.

The accelerometers in all permutations were selected from different manufacturers, to ensure that the fingerprints weren’t simply defects resulting from a particular production line.

With 96 percent accuracy, the researchers could discriminate one sensor from another.

“We do not need to know any other information about the phone — no phone number or SIM card number,” Dey said. “Just by looking at the data, we can tell you which device it’s coming from. It’s almost like another identifier.”

In the real world, this suggests that even when a smartphone application doesn’t have access to location information (by asking “this application would like to use your current location”), there are other means of identifying the user’s activities. It could be obtained with an innocuous-seeming game or chatting service, simply by recording and sending accelerometer data. There are no regulations mandating consent.

To collect the data, the researchers — as with any would-be attacker — needed to sample the accelerometer data. Each accelerometer was vibrated using a single vibrator motor — like those that buzz when a text message is received — for two-second intervals. During those periods, the accelerometer detected the movement and the readings were transmitted to a supervised-learning tool, which decoded the fingerprint.

See Also

“Even if you erase the app in the phone, or even erase and reinstall all software,” Roy said, “the fingerprint still stays inherent. That’s a serious threat.”

Read more . . .

 

The Latest on: Smartphone sensors

[google_news title=”” keyword=”Smartphone sensors” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]

via Google News

 

The Latest on: Smartphone sensors

via  Bing News

 

What's Your Reaction?
Don't Like it!
0
I Like it!
0
Scroll To Top