Categories: Security

Smartphones ‘Can Be Unlocked’ Using Covert Sensor Data

Researchers in Singapore have demonstrated a machine learning technique that could allow hackers to accurately determine a smartphone’s access code in three guesses, based on information collected from the device’s sensors.

The Nanyang Technological University (NTU) study collected data from six Android smartphone sensors as three users entered a set of 70 randomly selected, four-digit passcodes, and used a machine-learning algorithm to analyse how the phone tilted or how much light was blocked by the user’s hand as each digit was pressed.

The system was able to unlock an Android smartphone with a 99.5 percent accuracy rate in only three tries, when used on a phone that was protected using one of the 50 most common four-digit access codes.

Researchers said the system could be expanded to work on all the possible combinations of four-digit numbers.

Sensor spying

Their study is similar to one published by Newcastle University last year, which achieved 70 percent accuracy on the first try, rising to 100 percent in five guesses.

In both cases, researchers collected data from phone sensors, with the NTU Singapore study using information from the phone’s accelerometer, gyroscope, magnetometer, proximity sensor, barometer, and ambient light sensor.

“When you hold your phone and key in the PIN, the way the phone moves when you press 1, 5, or 9, is very different,” stated Dr. Shivam Bhasin, who worked on the 10-month project with David Berend and Dr. Bernhard Jungk.

Both studies highlight the way seemingly unimportant sensor information can be used to crack even critical security protections.

The sensors used in the NTU study require no permissions to be granted to an app by a phone’s user and as such are available to any mobile software.

[poll id=”125″

Automated PIN cracking

As a result, the researchers said a malicious app could conceivably be built that could collect code-entry data from thousands of users over a period of time and analyse it to the point of being able to reliably crack the code protecting any given handset.

NTU urged phone makers to place more restrictions on how apps can access sensor data.

“Along with the potential for leaking passwords, we are concerned that access to phone sensor information could reveal far too much about a user’s behaviour,” stated NTU professor Gan Chee Lip.

Researchers also recommended the use of passcodes with more than four digits and extra protective measures such as fingerprint sensors, two-factor authentication or one-time passwords.

Put your knowledge of artificial intelligence (AI) to the test. Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Google Consolidates DeepMind And AI Research Teams

AI push sees Alphabet's Google saying it will consolidate its AI teams in its Research…

15 hours ago

Apple Pulls WhatsApp, Threads From China App Store

Beijing orders Apple to pull Meta's WhatsApp and Threads from its Chinese App Store over…

19 hours ago

Intel Foundry Assembles Next Gen Chip Machine From ASML

Key milestone sees Intel Foundry assemble ASML's new “High NA EUV” lithography tool, to begin…

23 hours ago

Creating Deepfake Porn Without Consent To Become A Crime

People who create sexually explicit ‘deepfakes’ of adults will face prosecution under a new law…

2 days ago

Google Fires 28 Staff Over Israel Protest, Undertakes More Layoffs

Protest at cloud contract with Israel results in staff firings, in addition to layoffs of…

2 days ago