The curious case of the curious case: Detecting touchscreen events using a smartphone protective case

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Security-conscious users are very careful with software they allow their phone to run. They are much less careful with the choices they make regarding accessories such as headphones or chargers and only few, if any, care about cyber security threats coming from the phone's protective case. We show how a malicious smartphone protective case can be used to detect and monitor the victim's interaction with the phone's touchscreen, opening the door to keylogger-like attacks, threatening the user's security and privacy. This feat is achieved by implementing a hidden capacitive sensing mechanism inside the case. Our attack is both sensitive enough to track the user's finger location across the screen, and simple and cheap enough to be mass-produced and deployed en masse. We discuss the theoretical principles behind this attack, present a preliminary proof-of-concept, and discuss potential countermeasures and mitigations.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages99-103
Number of pages5
ISBN (Electronic)9780769561073
DOIs
StatePublished - 30 Jun 2017
Event2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017 - Paris, France
Duration: 29 Apr 201730 Apr 2017

Publication series

NameProceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017

Conference

Conference2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017
Country/TerritoryFrance
CityParis
Period29/04/1730/04/17

Keywords

  • Privacy
  • Security
  • Smartphone
  • Touchscreen leak

Fingerprint

Dive into the research topics of 'The curious case of the curious case: Detecting touchscreen events using a smartphone protective case'. Together they form a unique fingerprint.

Cite this