Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

2/7/2017
02:30 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

New Method Can Catch Smartphone Thieves In 14 Seconds

New research from Ben-Gurion University of the Negev shows promise in quickly identifying smartphone hackers.

Researchers at Ben-Gurion University of the Negev claim they have developed a technique based on sequences of gestures that identifies a smartphone thief in under 14 seconds.

"It can even be faster, a matter of seconds, depending on how many gestures there are," says BGU researcher Liron Ben Kimon.

According to Ben Kimon, the researchers culled information from 20 users over a two-week period last fall to develop a model that shows unauthorized users can be identified in under 14 seconds with less than 35 screen actions. She says on average, a user touches a smartphone screen 35 times in 13.8 seconds.

The verification model extracts information from a smartphone’s sensors to identify frequency, pressure and speed of touch combined with the application used. The program also computes 30 seconds of recent history, such as which screens a user touched, the buttons he or she pressed, and how much electricity was used.

"A thief will almost certainly touch the screen more than 35 times to steal information because he is not familiar with an owner’s phone settings and apps," Ben Kimon said in an announcement of the research today. "The phone can learn the typical touch and sequence pattern and lock out an unauthorized user to prevent data theft or someone you don’t want looking at your messages."

Ben Kimon underscores that this is still in the research stages and no commercial applications have been formally discussed. Kimon says it would be possible for the system to send an alert to an organization’s incident response system.

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
antoinexener
50%
50%
antoinexener,
User Rank: Apprentice
2/28/2017 | 10:57:46 AM
Re: Attn
14 seconds, that's pretty incredible. Unless you got your phone stolen by a ninja, this will work !
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
2/9/2017 | 8:16:34 AM
Attn
Attention smartphone thieves: Be slow and methodical.  ;)
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
GDPR Enforcement Loosens Amid Pandemic
Seth Rosenblatt, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4248
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 175484.
CVE-2020-8329
PUBLISHED: 2020-05-28
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, causing an error to be displayed and preventing printer from functioning until the printer is rebooted...
CVE-2020-8330
PUBLISHED: 2020-05-28
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, preventing subsequent print jobs until the printer is rebooted.
CVE-2020-4231
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
CVE-2020-4232
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.