Smartphone speech privacy concerns from side-channel attacks on facial biomechanics

被引:5
|
作者
Griswold-Steiner, Isaac [1 ]
LeFevre, Zachary [1 ]
Serwadda, Abdul [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Smartphone privacy; Motion sensors; Side-channel attack; User identification; Speech privacy;
D O I
10.1016/j.cose.2020.102110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech is a complex orchestration of physical movements which involves the lungs, vocal cords, face, jaw, and mouth. As we speak on the phone, we inadvertently impart energy on the mobile device at our ear, causing it to move as our face shapes words and sounds. We theorize that different phonetics from the International Phonetic Alphabet (IPA), which act as the building blocks of speech, may have their own fingerprint on motion sensor data during a phone conversation. When phonetics are combined into words, the relationship between phonetics and motion sensor data could cause words to also be identifiable. Based on an initial investigation into the relationship between phonetics and motion sensor data, we develop attacks to evaluate the risk that this could pose to user privacy. We evaluate attacks for classifying digits, differentiating between digit and non-digit speech, identifying the gender of the user, and user identification. The results of these experiments in various configurations demonstrate that the attacks can be highly effective. Our research adds to the body of work making the case for additional measures to control and protect data produced by users and their devices. Without action on the part of technology producers, users will remain vulnerable to attacks which leverage APIs that leave the user without any ability to control the data that their devices generate. (C) 2020 Published by Elsevier Ltd.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [22] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [23] Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
    Lerman, Liran
    Markowitch, Olivier
    Veshchikov, Nikita
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,
  • [24] Protecting Encrypted Cookies from Compression Side-Channel Attacks
    Alawatugoda, Janaka
    Stebila, Douglas
    Boyd, Colin
    Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 86 - 106
  • [25] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [26] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [27] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [28] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [29] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [30] Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection
    Abbas, Sidra
    Ojo, Stephen
    Bouazzi, Imen
    Avelino Sampedro, Gabriel
    Al Hejaili, Abdullah
    Almadhor, Ahmad S.
    Kulhanek, Rastislav
    IEEE ACCESS, 2024, 12 : 138904 - 138920