The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks

Muzammil Hussain, Ahmed Mubarak Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi

Research output: Contribution to journalArticle

19 Citations (Scopus)

Abstract

Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.

Original languageEnglish
Pages (from-to)1-25
Number of pages25
JournalPervasive and Mobile Computing
Volume25
DOIs
Publication statusPublished - 01 Jan 2016

Fingerprint

Smartphones
Attack
Motion
Touch screens
Infiltration
Countermeasures
Context-aware
User Interface
User interfaces
Privacy
Recommendations
Sensing
Sensor
Sensors
Malware
Model

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Cite this

Hussain, Muzammil ; Ahmed Al-Haiqi, Ahmed Mubarak ; Zaidan, A. A. ; Zaidan, B. B. ; Mat Kiah, M. L. ; Anuar, Nor Badrul ; Abdulnabi, Mohamed. / The rise of keyloggers on smartphones : A survey and insight into motion-based tap inference attacks. In: Pervasive and Mobile Computing. 2016 ; Vol. 25. pp. 1-25.
@article{806b1b14fbbb486d8bf68ed28f44e5b4,
title = "The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks",
abstract = "Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.",
author = "Muzammil Hussain and {Ahmed Al-Haiqi}, {Ahmed Mubarak} and Zaidan, {A. A.} and Zaidan, {B. B.} and {Mat Kiah}, {M. L.} and Anuar, {Nor Badrul} and Mohamed Abdulnabi",
year = "2016",
month = "1",
day = "1",
doi = "10.1016/j.pmcj.2015.12.001",
language = "English",
volume = "25",
pages = "1--25",
journal = "Pervasive and Mobile Computing",
issn = "1574-1192",
publisher = "Elsevier",

}

The rise of keyloggers on smartphones : A survey and insight into motion-based tap inference attacks. / Hussain, Muzammil; Ahmed Al-Haiqi, Ahmed Mubarak; Zaidan, A. A.; Zaidan, B. B.; Mat Kiah, M. L.; Anuar, Nor Badrul; Abdulnabi, Mohamed.

In: Pervasive and Mobile Computing, Vol. 25, 01.01.2016, p. 1-25.

Research output: Contribution to journalArticle

TY - JOUR

T1 - The rise of keyloggers on smartphones

T2 - A survey and insight into motion-based tap inference attacks

AU - Hussain, Muzammil

AU - Ahmed Al-Haiqi, Ahmed Mubarak

AU - Zaidan, A. A.

AU - Zaidan, B. B.

AU - Mat Kiah, M. L.

AU - Anuar, Nor Badrul

AU - Abdulnabi, Mohamed

PY - 2016/1/1

Y1 - 2016/1/1

N2 - Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.

AB - Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.

UR - http://www.scopus.com/inward/record.url?scp=84975700569&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84975700569&partnerID=8YFLogxK

U2 - 10.1016/j.pmcj.2015.12.001

DO - 10.1016/j.pmcj.2015.12.001

M3 - Article

AN - SCOPUS:84975700569

VL - 25

SP - 1

EP - 25

JO - Pervasive and Mobile Computing

JF - Pervasive and Mobile Computing

SN - 1574-1192

ER -