Home > Research > Publications & Outputs > Find Me A Safe Zone

Electronic data

  • elsarticle-template-5-harv

    Rights statement: This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 80, 2019 DOI: 10.1016/j.cose.2018.09.017

    Accepted author manuscript, 1.91 MB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks. / Zhang, Jie; Tang, Zhanyong; Li, Meng et al.
In: Computers and Security, Vol. 80, 01.2019, p. 273-290.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Zhang J, Tang Z, Li M, Fang D, Chen X, Wang Z. Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks. Computers and Security. 2019 Jan;80:273-290. Epub 2018 Oct 13. doi: 10.1016/j.cose.2018.09.017

Author

Zhang, Jie ; Tang, Zhanyong ; Li, Meng et al. / Find Me A Safe Zone : A Countermeasure for Channel State Information Based Attacks. In: Computers and Security. 2019 ; Vol. 80. pp. 273-290.

Bibtex

@article{65a1fe0e63964e47bd0e60b12be0e96e,
title = "Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks",
abstract = "Recently, channel state information (CSI) is shown to be an effective side-channel to perform attacks in public environments. Prior work has demonstrated that by analyzing how the CSI measurements of the wireless signal are affected by the mobile user's finger movements or gestures, an attacker can recover the user's input with a high success rate. Furthermore, the setup of this new attack is trivial, where the adversary only needs to place one or two malicious wireless devices near the target user. It would be difficult for many users to identify the nearby malicious devices while they want to continue to use mobile applications in public places. This dilemma makes protection of CSI-based attacks an urgent need. This article presents the first countermeasure for CSI-based attacks. Our key insight is that the success of any CSI-based attack requires high-quality CSI measurements; and we can significantly reduce the risk of information leakage by directing the user to a nearby location where the CSI readings are inherently noisy. To this end, we develop a regression based method to assess the risk of CSI-based attacks and exploit a well-established localization technique to identify potential malicious wireless devices. We then use this information to guide the user to a safe zone. We evaluate our approach by applying it to protect pattern lock and keystrokes in various indoor and outdoor environments. Experimental results show that our approach can effectively protect mobile users against CSI-based attacks.",
keywords = "Channel state information-based attacks, Countermeasures, Gesture recognition, Privacy protection, Security, Sensing",
author = "Jie Zhang and Zhanyong Tang and Meng Li and Dingyi Fang and Xiaojiang Chen and Zheng Wang",
note = "This is the author{\textquoteright}s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 80, 2019 DOI: 10.1016/j.cose.2018.09.017",
year = "2019",
month = jan,
doi = "10.1016/j.cose.2018.09.017",
language = "English",
volume = "80",
pages = "273--290",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Ltd",

}

RIS

TY - JOUR

T1 - Find Me A Safe Zone

T2 - A Countermeasure for Channel State Information Based Attacks

AU - Zhang, Jie

AU - Tang, Zhanyong

AU - Li, Meng

AU - Fang, Dingyi

AU - Chen, Xiaojiang

AU - Wang, Zheng

N1 - This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 80, 2019 DOI: 10.1016/j.cose.2018.09.017

PY - 2019/1

Y1 - 2019/1

N2 - Recently, channel state information (CSI) is shown to be an effective side-channel to perform attacks in public environments. Prior work has demonstrated that by analyzing how the CSI measurements of the wireless signal are affected by the mobile user's finger movements or gestures, an attacker can recover the user's input with a high success rate. Furthermore, the setup of this new attack is trivial, where the adversary only needs to place one or two malicious wireless devices near the target user. It would be difficult for many users to identify the nearby malicious devices while they want to continue to use mobile applications in public places. This dilemma makes protection of CSI-based attacks an urgent need. This article presents the first countermeasure for CSI-based attacks. Our key insight is that the success of any CSI-based attack requires high-quality CSI measurements; and we can significantly reduce the risk of information leakage by directing the user to a nearby location where the CSI readings are inherently noisy. To this end, we develop a regression based method to assess the risk of CSI-based attacks and exploit a well-established localization technique to identify potential malicious wireless devices. We then use this information to guide the user to a safe zone. We evaluate our approach by applying it to protect pattern lock and keystrokes in various indoor and outdoor environments. Experimental results show that our approach can effectively protect mobile users against CSI-based attacks.

AB - Recently, channel state information (CSI) is shown to be an effective side-channel to perform attacks in public environments. Prior work has demonstrated that by analyzing how the CSI measurements of the wireless signal are affected by the mobile user's finger movements or gestures, an attacker can recover the user's input with a high success rate. Furthermore, the setup of this new attack is trivial, where the adversary only needs to place one or two malicious wireless devices near the target user. It would be difficult for many users to identify the nearby malicious devices while they want to continue to use mobile applications in public places. This dilemma makes protection of CSI-based attacks an urgent need. This article presents the first countermeasure for CSI-based attacks. Our key insight is that the success of any CSI-based attack requires high-quality CSI measurements; and we can significantly reduce the risk of information leakage by directing the user to a nearby location where the CSI readings are inherently noisy. To this end, we develop a regression based method to assess the risk of CSI-based attacks and exploit a well-established localization technique to identify potential malicious wireless devices. We then use this information to guide the user to a safe zone. We evaluate our approach by applying it to protect pattern lock and keystrokes in various indoor and outdoor environments. Experimental results show that our approach can effectively protect mobile users against CSI-based attacks.

KW - Channel state information-based attacks

KW - Countermeasures

KW - Gesture recognition

KW - Privacy protection

KW - Security

KW - Sensing

U2 - 10.1016/j.cose.2018.09.017

DO - 10.1016/j.cose.2018.09.017

M3 - Journal article

VL - 80

SP - 273

EP - 290

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

ER -