首页> 外文期刊>Information Security Technical Report >TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript
【24h】

TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript

机译:TouchSignatures:通过JavaScript基于移动传感器数据识别用户触摸动作和PIN

获取原文
获取原文并翻译 | 示例
           

摘要

Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user security and privacy are however not considered in W3C specifications. In this work, for the first time, we show how user security can be compromised using these sensor data via browser, despite that the data rate is 3-5 times slower than what is available in app. We examine multiple popular browsers on Android and iOS platforms and study their policies in granting permissions to JavaScript code with respect to access to motion and orientation sensor data. Based on our observations, we identify multiple vulnerabilities, and propose TouchSignatures which implements an attack where malicious JavaScript code on an attack tab listens to such sensor data measurements. Based on these streams, TouchSignatures is able to distinguish the user's touch actions (i.e., tap, scroll, hold, and zoom) and her PINs, allowing a remote website to learn the client-side user activities. We demonstrate the practicality of this attack by collecting data from real users and reporting high success rates using our proof-of-concept implementations. We also present a set of potential solutions to address the vulnerabilities. The W3C community and major mobile browser vendors including Mozilla, Google, Apple and Opera have acknowledged our work and are implementing some of our proposed countermeasures.
机译:符合W3C规范,移动Web浏览器允许网页中的JavaScript代码无需用户许可即可访问运动和方向传感器数据。但是,在W3C规范中未考虑与用户安全和隐私相关的风险。在这项工作中,我们首次展示了如何通过浏览器使用这些传感器数据来危及用户安全,尽管数据速率比应用程序中的数据速率慢3-5倍。我们研究了Android和iOS平台上的多种流行浏览器,并研究了它们在访问运动和方向传感器数据方面向JavaScript代码授予权限的政策。根据我们的观察,我们确定了多个漏洞,并提出了TouchSignatures来实施攻击,其中攻击选项卡上的恶意JavaScript代码会侦听此类传感器数据的测量结果。根据这些流,TouchSignatures能够区分用户的触摸操作(即,点击,滚动,保持和缩放)和她的PIN,从而使远程网站可以了解客户端的用户活动。我们通过从真实用户那里收集数据并使用我们的概念验证实现来报告高成功率,从而证明了这种攻击的可行性。我们还提出了一组潜在的解决方案,以解决这些漏洞。 W3C社区和主要的移动浏览器供应商(包括Mozilla,Google,Apple和Opera)已经认可了我们的工作,并正在实施一些建议的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号