Stealing PINs via Mobile Sensors: Actual Risk versus User Perception

In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F, Feng, Hao
Format Paper Journal Article
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 18.04.2017
Subjects
Online AccessGet full text
ISSN2331-8422
DOI10.48550/arxiv.1605.05549

Cover

Abstract In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website controlled by an attacker, the JavaScript code embedded in the web page starts listening to the motion and orientation sensor streams without needing any permission from the user. By analysing these streams, it infers the user's PIN using an artificial neural network. Based on a test set of fifty 4-digit PINs, PINlogger.js is able to correctly identify PINs in the first attempt with a success rate of 74% which increases to 86 and 94% in the second and third attempts, respectively. The high success rates of stealing user PINs on mobile devices via JavaScript indicate a serious threat to user security. With the technical understanding of the information leakage caused by mobile phone sensors, we then study users' perception of the risks associated with these sensors. We design user studies to measure the general familiarity with different sensors and their functionality, and to investigate how concerned users are about their PIN being discovered by an app that has access to all these sensors. Our studies show that there is significant disparity between the actual and perceived levels of threat with regard to the compromise of the user PIN. We confirm our results by interviewing our participants using two different approaches, within-subject and between-subject, and compare the results. We discuss how this observation, along with other factors, renders many academic and industry solutions ineffective in preventing such side channel attacks.
AbstractList International Journal of Information Security, P1-23, April 2017 In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website controlled by an attacker, the JavaScript code embedded in the web page starts listening to the motion and orientation sensor streams without needing any permission from the user. By analysing these streams, it infers the user's PIN using an artificial neural network. Based on a test set of fifty 4-digit PINs, PINlogger.js is able to correctly identify PINs in the first attempt with a success rate of 74% which increases to 86 and 94% in the second and third attempts, respectively. The high success rates of stealing user PINs on mobile devices via JavaScript indicate a serious threat to user security. With the technical understanding of the information leakage caused by mobile phone sensors, we then study users' perception of the risks associated with these sensors. We design user studies to measure the general familiarity with different sensors and their functionality, and to investigate how concerned users are about their PIN being discovered by an app that has access to all these sensors. Our studies show that there is significant disparity between the actual and perceived levels of threat with regard to the compromise of the user PIN. We confirm our results by interviewing our participants using two different approaches, within-subject and between-subject, and compare the results. We discuss how this observation, along with other factors, renders many academic and industry solutions ineffective in preventing such side channel attacks.
In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website controlled by an attacker, the JavaScript code embedded in the web page starts listening to the motion and orientation sensor streams without needing any permission from the user. By analysing these streams, it infers the user's PIN using an artificial neural network. Based on a test set of fifty 4-digit PINs, PINlogger.js is able to correctly identify PINs in the first attempt with a success rate of 74% which increases to 86 and 94% in the second and third attempts, respectively. The high success rates of stealing user PINs on mobile devices via JavaScript indicate a serious threat to user security. With the technical understanding of the information leakage caused by mobile phone sensors, we then study users' perception of the risks associated with these sensors. We design user studies to measure the general familiarity with different sensors and their functionality, and to investigate how concerned users are about their PIN being discovered by an app that has access to all these sensors. Our studies show that there is significant disparity between the actual and perceived levels of threat with regard to the compromise of the user PIN. We confirm our results by interviewing our participants using two different approaches, within-subject and between-subject, and compare the results. We discuss how this observation, along with other factors, renders many academic and industry solutions ineffective in preventing such side channel attacks.
Author Shahandashti, Siamak F
Toreini, Ehsan
Feng, Hao
Mehrnezhad, Maryam
Author_xml – sequence: 1
  givenname: Maryam
  surname: Mehrnezhad
  fullname: Mehrnezhad, Maryam
– sequence: 2
  givenname: Ehsan
  surname: Toreini
  fullname: Toreini, Ehsan
– sequence: 3
  givenname: Siamak
  surname: Shahandashti
  middlename: F
  fullname: Shahandashti, Siamak F
– sequence: 4
  givenname: Hao
  surname: Feng
  fullname: Feng, Hao
BackLink https://doi.org/10.1007/s10207-017-0369-x$$DView published paper (Access to full text may be restricted)
https://doi.org/10.48550/arXiv.1605.05549$$DView paper in arXiv
BookMark eNotj8tOwzAUBS0EEqX0A1hhiXWCn7HDriqvSgUqWtaRHd8gl5AUO4ng7yktq7MZHc2coeOmbQChC0pSoaUk1yZ8-yGlGZEpkVLkR2jEOKeJFoydokmMG0IIyxSTko_Q7aoDU_vmHS_nzxEP3uCn1voa8Aqa2IZ4g6dl15sav_r4gQcIsY_4LULASwglbDvfNufopDJ1hMn_jtH6_m49e0wWLw_z2XSRGMlEojQBACEzAxYoBSttnpWqYoKX1DnNK15yqXJdKeustjmRQgjlXF5qR5ziY3R5uN0nFtvgP034Kf5Si33qjrg6ENvQfvUQu2LT9qHZORWMKMmpVlzwXz-MV90
ContentType Paper
Journal Article
Copyright 2017. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
http://arxiv.org/licenses/nonexclusive-distrib/1.0
Copyright_xml – notice: 2017. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
DOI 10.48550/arxiv.1605.05549
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection (subscription)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database (subscription)
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
arXiv Computer Science
arXiv.org
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Engineering Collection
DatabaseTitleList
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
ExternalDocumentID 1605_05549
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
ID FETCH-LOGICAL-a524-780eee456aebe11eb5b96c7f243c1dd83f3c35798f7bdb8b9054447dd9c8d0d73
IEDL.DBID 8FG
IngestDate Tue Jul 22 22:02:01 EDT 2025
Mon Jun 30 09:42:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a524-780eee456aebe11eb5b96c7f243c1dd83f3c35798f7bdb8b9054447dd9c8d0d73
Notes SourceType-Working Papers-1
ObjectType-Working Paper/Pre-Print-1
content type line 50
OpenAccessLink https://www.proquest.com/docview/2075318734?pq-origsite=%requestingapplication%
PQID 2075318734
PQPubID 2050157
ParticipantIDs arxiv_primary_1605_05549
proquest_journals_2075318734
PublicationCentury 2000
PublicationDate 20170418
PublicationDateYYYYMMDD 2017-04-18
PublicationDate_xml – month: 04
  year: 2017
  text: 20170418
  day: 18
PublicationDecade 2010
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2017
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 1.6243093
SecondaryResourceType preprint
Snippet In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js...
International Journal of Information Security, P1-23, April 2017 In this paper, we present the actual risks of stealing user PINs by using mobile sensors...
SourceID arxiv
proquest
SourceType Open Access Repository
Aggregation Database
SubjectTerms Artificial neural networks
Cell phones
Cellular telephones
Computer Science - Cryptography and Security
Cybersecurity
Electronic devices
Perceptions
Risk perception
Sensors
Smartphones
Streams
Websites
SummonAdditionalLinks – databaseName: arXiv.org
  dbid: GOX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV3fS8MwED7mnnwRRWXTKXnwtbimaZPubahzCFPRDfpW8qtQhFXabfjne0k7fRBfQxLI5S7fl8vdBeAGGbDUItWBpTYOGGVJoAzaFTJvmQgdq9A6P-TiOZmv2FMWZz0g-1wYWX-Vu7Y-sGpuw8S5PBDx0gOXq-i09vElax8nfSmurv9vP-SYvunP0erxYnYMRx3RI9N2Z06gZ9encO_CZ10COMHbdEN2pSSLSqFhkne8TlZ1MyFTn9FB3srmg7iQiW1DVqgm5PUnAuUMlrOH5d086P4xCGRMWcDF2FqLREWiwMLQqlilieYFZZEOjRFREeko5qkouDJKqBRZFGPcmFQLMzY8Oof-ulrbAZCx4kwYXSQKUQVnwcPJOQOpNDgnK-gQBn71-WdbqiJ3gsm9YIYw2gsk79S0ySkSBjRqHrGL_0dewiF1WOYKHIoR9Df11l4hEm_Utd-Ob9-QiHI
  priority: 102
  providerName: Cornell University
Title Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
URI https://www.proquest.com/docview/2075318734
https://arxiv.org/abs/1605.05549
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEF60RfDmk1Zr2YPXaLLZZDdexEcfCK2lttBb2FegCE1N2uLJ3-7sNtaD4CWQLCxkdnZm9ttvZhC6hghYKJ4ozxATeZTQ2JMa9hVE3iLmKpKBsTjkYBj3p_RlFs0qwK2saJU_NtEZap0ri5FbJATUhbOQ3i8_PNs1yt6uVi009lE9IKBJNlO829thLCRmEDGH28tMV7rrVhSf842FVKIbHzyppSG6T39MsfMv3SNUH4mlKY7RnlmcoANHy1TlKXq2dFubMI7h9F3izVzgQS5hI-M3OH7mRXmHH1wGCB7Py3dsKRbrEk9BrfBox1g5Q5NuZ_LU96q-B56ICPUY940xENgIEHAQGBnJJFYsIzRUgdY8zEIVRizhGZNacplA1EUp0zpRXPuaheeotsgXpoGwLxnlWmWxBC8Es4Axs-AhERrmpBlpoob7-3S5LW2RWsGkTjBN1PoRSFqpdZn-LsLF_8OX6JBY_2eLIvIWqq2KtbkC772SbbdEbVR_7AxHY3jrvc7gOfjqfAMIr5zf
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LSwMxEB60RfTmE6tVc9DjapvNbrKCiE9ataVoBW9LXgtFaGvXVv1x_jcn6VYPgjevuzCQyTy-mcwDYB8RsNQi0YGlNgoYZXGgDOoVIm8ZCx2punV5yFY7bjyym6foaQ4-Z70wrqxyZhO9oTYD7XLkLhOC4iJ4yE6HL4HbGuVeV2crNGSxWsGc-BFjRWPHrf14wxAuP2le4n0fUHp91b1oBMWWgUBGlAVc1Ky1CCMkHqdetypSSax5Rlmo68aIMAt1GPFEZFwZJVSCGIcxbkyihakZHiLZeSgj6ghRqcrnV-3O_XeSh8YcIXs4fU31s8OO5Oi9N3E5neiwhq7c1UH6T798gXdw18tQ7sihHa3AnO2vwoKvC9X5Gly6el_XsU4w_M_JpCdJa6DQkpAHjH8Ho_yYnPkWFHLfy5-Jq_EY5-QR5Zp0vktm1qH7HyzZgFJ_0LebQGqKM2F0Fit0g0gFranLXlJpkCbLaAU2_enT4XS2RuoYk3rGVKA6Y0ha6FWe_kjB1t-_92Cx0W3dpXfN9u02LFHnjN2ERlGF0utobHcQSryq3eLCCKT_LCJfLY_csQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stealing+PINs+via+Mobile+Sensors%3A+Actual+Risk+versus+User+Perception&rft.jtitle=arXiv.org&rft.au=Mehrnezhad%2C+Maryam&rft.au=Toreini%2C+Ehsan&rft.au=Shahandashti%2C+Siamak+F&rft.au=Feng%2C+Hao&rft.date=2017-04-18&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1605.05549