Abstract
Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.
Original language | English |
---|---|
Pages (from-to) | 1-25 |
Number of pages | 25 |
Journal | Pervasive and Mobile Computing |
Volume | 25 |
DOIs | |
Publication status | Published - 01 Jan 2016 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Software
- Information Systems
- Hardware and Architecture
- Computer Science Applications
- Computer Networks and Communications
Cite this
}
The rise of keyloggers on smartphones : A survey and insight into motion-based tap inference attacks. / Hussain, Muzammil; Ahmed Al-Haiqi, Ahmed Mubarak; Zaidan, A. A.; Zaidan, B. B.; Mat Kiah, M. L.; Anuar, Nor Badrul; Abdulnabi, Mohamed.
In: Pervasive and Mobile Computing, Vol. 25, 01.01.2016, p. 1-25.Research output: Contribution to journal › Article
TY - JOUR
T1 - The rise of keyloggers on smartphones
T2 - A survey and insight into motion-based tap inference attacks
AU - Hussain, Muzammil
AU - Ahmed Al-Haiqi, Ahmed Mubarak
AU - Zaidan, A. A.
AU - Zaidan, B. B.
AU - Mat Kiah, M. L.
AU - Anuar, Nor Badrul
AU - Abdulnabi, Mohamed
PY - 2016/1/1
Y1 - 2016/1/1
N2 - Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.
AB - Smartphone sensing capabilities have opened new opportunities for innovative User Interface (UI) and context-aware applications. They have also opened new possibilities for potential risks to user privacy and security infiltration. Researchers have recently explored a new attack vector that exploits the built-in motion sensors to infer user taps on smartphone touchscreens. This new side channel has introduced the threat of keylogging to smartphones despite the lack of physical keyboards. In this paper, we review this type of attack and survey the leading works in the literature to highlight the underpinning motivations and threat model. We also discuss the main issues in the design and implementation of the new attack, in order to provide insights into the practicality, prospects, and limitations of the different approaches. Different countermeasures that can mitigate the rising threat are investigated, and recommendations for further research on this emerging trend are discussed. A comparative summary of the surveyed works is also presented.
UR - http://www.scopus.com/inward/record.url?scp=84975700569&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84975700569&partnerID=8YFLogxK
U2 - 10.1016/j.pmcj.2015.12.001
DO - 10.1016/j.pmcj.2015.12.001
M3 - Article
AN - SCOPUS:84975700569
VL - 25
SP - 1
EP - 25
JO - Pervasive and Mobile Computing
JF - Pervasive and Mobile Computing
SN - 1574-1192
ER -