Visible to the public POSTER: WiPING: Wi-Fi Signal-based PIN Guessing Attack

TitlePOSTER: WiPING: Wi-Fi Signal-based PIN Guessing Attack
Publication TypeConference Paper
Year of Publication2016
AuthorsCha, Seunghun, Park, Jaewoo, Cho, Geumhwan, Huh, Jun Ho, Kim, Hyoungshick
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
Keywordsauthentication, Collaboration, composability, Human Behavior, Metrics, pattern locks, pubcrawl, Resiliency, Scalability, screen lock, side-channel attacks
Abstract

This paper presents a new type of online password guessing attack called "WiPING" (Wi-Fi signal-based PIN Guessing attack) to guess a victim's PIN (Personal Identification Number) within a small number of unlock attempts. WiPING uses wireless signal patterns identified from observing sequential finger movements involved in typing a PIN to unlock a mobile device. A list of possible PIN candidates is generated from the wireless signal patterns, and is used to improve performance of PIN guessing attacks. We implemented a proof-of-concept attack to demonstrate the feasibility of WiPING. Our results showed that WiPING could be practically effective: while pure guessing attacks failed to guess all 20 PINs, WiPING successfully guessed two PINs.

URLhttp://doi.acm.org/10.1145/2976749.2989067
DOI10.1145/2976749.2989067
Citation Keycha_poster:_2016