-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathabstract.tex
16 lines (16 loc) · 1.59 KB
/
abstract.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
\begin{abstract}
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. In this
paper, we demonstrate a novel video-based attack to reconstruct Android lock patterns from video footage filmed using a mobile
phone camera. Unlike prior attacks on pattern lock, this new attack does not require the video to capture ant content
displayed on the screen. Instead, we employ a computer vision algorithm to track the fingertip movements to infer
the pattern. Using the geometry information extracted from the tracked fingertip motions, our approach is able to
accurately identify a small number of (often one) candidate patterns to be tested by an adversary. We thoroughly
evaluated our approach using 120 unique patterns collected from 215 independent users, by applying it to
reconstruct patterns from video footage filmed using mobile phone cameras. Experimental results show that our
approach can break over 95\% of the patterns in five attempts before the device is automatically locked by the
Android operating system. We discovered that, in contrast to many people's belief, complex patterns do not offer
stronger protection under our attacking scenarios. This is demonstrated by the fact that we are able to break all
but one complex patterns (with a 97.5\% success rate) as opposed to 60\% of the simple patterns in the first attempt. Since our threat model is
common in day-to-day life, this paper calls for the community to revisit the risks of using Android pattern lock to
protect sensitive information.
\end{abstract}