Machine learning for attacking gesture-based phone unlocking

With the rapid evolution of technology, the use of smart phones in our everyday lives has increased at a tremendous rate. However, our rising reliance on smartphones for our day-to-day activities exposes us to some security concerns. Nowadays, smartphones are equipped with a variety of devices, such...

Full description

Saved in:
Bibliographic Details
Main Author: Kumar Vembu Swathi
Other Authors: Thomas Peyrin
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156328
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156328
record_format dspace
spelling sg-ntu-dr.10356-1563282022-04-13T13:30:41Z Machine learning for attacking gesture-based phone unlocking Kumar Vembu Swathi Thomas Peyrin School of Computer Science and Engineering thomas.peyrin@ntu.edu.sg Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence With the rapid evolution of technology, the use of smart phones in our everyday lives has increased at a tremendous rate. However, our rising reliance on smartphones for our day-to-day activities exposes us to some security concerns. Nowadays, smartphones are equipped with a variety of devices, such as cameras, sensors like accelerometers and gyroscopes. Various applications that we use have access to these devices without our knowledge. A side-channel attack uses information acquired from the system’s implementation via these devices to obtain sensitive information. Through the use of these instruments or side channels, an attacker could potentially recover information, such as PIN codes, which would give them unauthorised access to the victim's devices. The side channels could leak information like the variation of light, orientation of phone and even coordinates of the eyes and head when the victims are typing their PIN code. According to the current state-of-the-art research, machine learning and deep learning techniques are applied on either the sensor or camera data to retrieve PIN codes with a good accuracy. The objective of this project is to process, analyse and combine the various types of side-channel information to train a model to retrieve PIN codes with a higher accuracy. For this purpose, we create a dataset approximately with 9.8K unique points. The best results were achieved using a Decision Tree Classifier model. The accuracy to predict whether digit ‘0’ is present in the PIN code or not was 55% while the accuracy for digit ‘1’ was 54%. Based on the literature analysis, the results obtained are conclusive and are of good standard. Future works will focus on using these results to retrieve the entire PIN code sequence. Bachelor of Engineering (Computer Science) 2022-04-13T13:30:41Z 2022-04-13T13:30:41Z 2022 Final Year Project (FYP) Kumar Vembu Swathi (2022). Machine learning for attacking gesture-based phone unlocking. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156328 https://hdl.handle.net/10356/156328 en SCSE21-0299 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
spellingShingle Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
Kumar Vembu Swathi
Machine learning for attacking gesture-based phone unlocking
description With the rapid evolution of technology, the use of smart phones in our everyday lives has increased at a tremendous rate. However, our rising reliance on smartphones for our day-to-day activities exposes us to some security concerns. Nowadays, smartphones are equipped with a variety of devices, such as cameras, sensors like accelerometers and gyroscopes. Various applications that we use have access to these devices without our knowledge. A side-channel attack uses information acquired from the system’s implementation via these devices to obtain sensitive information. Through the use of these instruments or side channels, an attacker could potentially recover information, such as PIN codes, which would give them unauthorised access to the victim's devices. The side channels could leak information like the variation of light, orientation of phone and even coordinates of the eyes and head when the victims are typing their PIN code. According to the current state-of-the-art research, machine learning and deep learning techniques are applied on either the sensor or camera data to retrieve PIN codes with a good accuracy. The objective of this project is to process, analyse and combine the various types of side-channel information to train a model to retrieve PIN codes with a higher accuracy. For this purpose, we create a dataset approximately with 9.8K unique points. The best results were achieved using a Decision Tree Classifier model. The accuracy to predict whether digit ‘0’ is present in the PIN code or not was 55% while the accuracy for digit ‘1’ was 54%. Based on the literature analysis, the results obtained are conclusive and are of good standard. Future works will focus on using these results to retrieve the entire PIN code sequence.
author2 Thomas Peyrin
author_facet Thomas Peyrin
Kumar Vembu Swathi
format Final Year Project
author Kumar Vembu Swathi
author_sort Kumar Vembu Swathi
title Machine learning for attacking gesture-based phone unlocking
title_short Machine learning for attacking gesture-based phone unlocking
title_full Machine learning for attacking gesture-based phone unlocking
title_fullStr Machine learning for attacking gesture-based phone unlocking
title_full_unstemmed Machine learning for attacking gesture-based phone unlocking
title_sort machine learning for attacking gesture-based phone unlocking
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156328
_version_ 1731235760635379712