WheelLogger

Driver Tracing Using Smart Watch

Joon Young Park, Jong Pil Yun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissions feature on modern smart devices can prevent direct leakage of information from location-related sensors, recent research has shown that leakage of location-related information is possible through indirect, side-channel attacks. In this paper, we show that the travel path of a vehicle can be inferred without acknowledging the user using a zero-permission smart watch application. The sensor we used in our experiment is the accelerometer sensor on Apple Watch. We find that a targeted user can be traced with 83% accuracy. We suggest that our approach may be used to successfully attack other smart phone devices because it was successful on Apple Watch, which is considered as the most constrained device in the market. This result shows that the zero-permission application on a smart watch, if manipulated adequately, can transform into a high-threat malware.

Original languageEnglish
Title of host publicationInformation Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers
PublisherSpringer Verlag
Pages87-100
Number of pages14
ISBN (Print)9783319935621
DOIs
Publication statusPublished - 2018 Jan 1
Event18th World International Conference on Information Security and Application, WISA 2017 - Jeju Island, Korea, Republic of
Duration: 2017 Aug 242017 Aug 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10763 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other18th World International Conference on Information Security and Application, WISA 2017
CountryKorea, Republic of
CityJeju Island
Period17/8/2417/8/26

Fingerprint

Watches
Tracing
Driver
Apple
Leakage
Sensor
Sensors
Side Channel Attacks
Malware
Accelerometer
Zero
Accelerometers
Mobile devices
Mobile Devices
Privacy
Attack
Transform
Path
Experiment
Experiments

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Park, J. Y., Yun, J. P., & Lee, D. H. (2018). WheelLogger: Driver Tracing Using Smart Watch. In Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers (pp. 87-100). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10763 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-93563-8_8

WheelLogger : Driver Tracing Using Smart Watch. / Park, Joon Young; Yun, Jong Pil; Lee, Dong Hoon.

Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, 2018. p. 87-100 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Park, JY, Yun, JP & Lee, DH 2018, WheelLogger: Driver Tracing Using Smart Watch. in Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10763 LNCS, Springer Verlag, pp. 87-100, 18th World International Conference on Information Security and Application, WISA 2017, Jeju Island, Korea, Republic of, 17/8/24. https://doi.org/10.1007/978-3-319-93563-8_8
Park JY, Yun JP, Lee DH. WheelLogger: Driver Tracing Using Smart Watch. In Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag. 2018. p. 87-100. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-93563-8_8
Park, Joon Young ; Yun, Jong Pil ; Lee, Dong Hoon. / WheelLogger : Driver Tracing Using Smart Watch. Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, 2018. pp. 87-100 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{6420479904de447ebbaf58c42023452f,
title = "WheelLogger: Driver Tracing Using Smart Watch",
abstract = "Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissions feature on modern smart devices can prevent direct leakage of information from location-related sensors, recent research has shown that leakage of location-related information is possible through indirect, side-channel attacks. In this paper, we show that the travel path of a vehicle can be inferred without acknowledging the user using a zero-permission smart watch application. The sensor we used in our experiment is the accelerometer sensor on Apple Watch. We find that a targeted user can be traced with 83{\%} accuracy. We suggest that our approach may be used to successfully attack other smart phone devices because it was successful on Apple Watch, which is considered as the most constrained device in the market. This result shows that the zero-permission application on a smart watch, if manipulated adequately, can transform into a high-threat malware.",
author = "Park, {Joon Young} and Yun, {Jong Pil} and Lee, {Dong Hoon}",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-93563-8_8",
language = "English",
isbn = "9783319935621",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "87--100",
booktitle = "Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers",

}

TY - GEN

T1 - WheelLogger

T2 - Driver Tracing Using Smart Watch

AU - Park, Joon Young

AU - Yun, Jong Pil

AU - Lee, Dong Hoon

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissions feature on modern smart devices can prevent direct leakage of information from location-related sensors, recent research has shown that leakage of location-related information is possible through indirect, side-channel attacks. In this paper, we show that the travel path of a vehicle can be inferred without acknowledging the user using a zero-permission smart watch application. The sensor we used in our experiment is the accelerometer sensor on Apple Watch. We find that a targeted user can be traced with 83% accuracy. We suggest that our approach may be used to successfully attack other smart phone devices because it was successful on Apple Watch, which is considered as the most constrained device in the market. This result shows that the zero-permission application on a smart watch, if manipulated adequately, can transform into a high-threat malware.

AB - Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissions feature on modern smart devices can prevent direct leakage of information from location-related sensors, recent research has shown that leakage of location-related information is possible through indirect, side-channel attacks. In this paper, we show that the travel path of a vehicle can be inferred without acknowledging the user using a zero-permission smart watch application. The sensor we used in our experiment is the accelerometer sensor on Apple Watch. We find that a targeted user can be traced with 83% accuracy. We suggest that our approach may be used to successfully attack other smart phone devices because it was successful on Apple Watch, which is considered as the most constrained device in the market. This result shows that the zero-permission application on a smart watch, if manipulated adequately, can transform into a high-threat malware.

UR - http://www.scopus.com/inward/record.url?scp=85049477703&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85049477703&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-93563-8_8

DO - 10.1007/978-3-319-93563-8_8

M3 - Conference contribution

SN - 9783319935621

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 87

EP - 100

BT - Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers

PB - Springer Verlag

ER -