Cracking Android Pattern Lock in Five Attempts
نویسندگان
چکیده
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. This paper presents a novel video-based attack to reconstruct Android lock patterns from video footage filmed using a mobile phone camera. Unlike prior attacks on pattern lock, our approach does not require the video to capture any content displayed on the screen. Instead, we employ a computer vision algorithm to track the fingertip movements to infer the pattern. Using the geometry information extracted from the tracked fingertip motions, our approach is able to accurately identify a small number of (often one) candidate patterns to be tested by an adversary. We thoroughly evaluated our approach using 120 unique patterns collected from 215 independent users, by applying it to reconstruct patterns from video footage filmed using smartphone cameras. Experimental results show that our approach can break over 95% of the patterns in five attempts before the device is automatically locked by the Android operating system. We discovered that, in contrast to many people’s belief, complex patterns do not offer stronger protection under our attacking scenarios. This is demonstrated by the fact that we are able to break all but one complex patterns (with a 97.5% success rate) as opposed to 60% of the simple patterns in the first attempt. Since our threat model is common in day-to-day life, this paper calls for the community to revisit the risks of using Android pattern lock to protect sensitive information.
منابع مشابه
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory
Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs. Figure 1 Android lock pattern screen But, how many lock patterns are there? The of...
متن کاملA Review on Android Authentication System Vulnerabilities
Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security...
متن کاملA study on usability and security features of the Android pattern lock screen
Panagiotis Andriotis is a PhD student in Computer Science in Bristol, U.K.. He holds an MSc with Distinction in Computer Science from the University of Bristol, U.K. and a BSc in Mathematics from the University of Athens, Greece. His main research area is Digital Forensics with a focus on smartphones and other mobile devices running the Android Operating System. He is also interested in Human A...
متن کاملPoster: Design of Backdoor on Android Devices
This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms (e.g., 4-digit PIN) on Android devices. 1. Our goal and assumptions We aim to give insights in designing backdoor that can be used to provide persistent access to a victim’s Android device by compromising the secret for user authentication while effectively hiding its presence from the victim. We...
متن کاملBluetooth Security Lock for Android smart phone platform
The project is to make an Android appl ication which tr iggers a screen lock wi th a PIN when the device is disconnec ted f rom another B luetooth device. This application wi l l run in the background normally and constantly monitor the Bluetooth connection of the de vice. As soon as it catches a change in Bluetooth connect ivi ty s tate, it wi l l t r igger a lock screen to protect the device.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017