{"id":11289,"date":"2018-02-07T05:13:16","date_gmt":"2018-02-07T05:13:16","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=11289"},"modified":"2018-02-08T05:16:22","modified_gmt":"2018-02-08T05:16:22","slug":"your-mobile-phone-can-give-away-your-location-even-if-you-tell-it-not-to","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/your-mobile-phone-can-give-away-your-location-even-if-you-tell-it-not-to\/","title":{"rendered":"Your mobile phone can give away your location, even if you tell it not to"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/guevara-noubir-299586\">Guevara Noubir<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/northeastern-university-1644\">Northeastern University<\/a><\/em><\/span><\/p>\n<p>U.S. military officials were recently caught off guard by revelations that servicemembers\u2019 digital fitness trackers were <a href=\"https:\/\/labs.strava.com\/heatmap\/\">storing the locations<\/a> of their workouts \u2013 including at or near <a href=\"https:\/\/www.washingtonpost.com\/world\/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing\/2018\/01\/28\/86915662-0441-11e8-aa61-f3391373867e_story.html\">military bases and clandestine sites<\/a> around the world. But this threat is not limited to Fitbits and similar devices. My group\u2019s recent research has shown how mobile phones can also track their users through stores and cities and around the world \u2013 even when users turn off their phones\u2019 location-tracking services.<\/p>\n<p>The vulnerability comes from the wide range of sensors phones are equipped with \u2013 not just GPS and communications interfaces, but gyroscopes and accelerometers that can tell whether a phone is being held upright or on its side and can measure other movements too. Apps on the phone can use those sensors to perform tasks users aren\u2019t expecting \u2013 like <a href=\"https:\/\/doi.org\/10.1109\/MSP.2017.25\">following a user\u2019s movements turn by turn<\/a> along city streets.<\/p>\n<p>Most people expect that turning their phone\u2019s location services off disables this sort of mobile surveillance. But the research I conduct with my colleagues <a href=\"https:\/\/www.ccis.northeastern.edu\/people\/sashank-narain\/\">Sashank Narain<\/a>, <a href=\"https:\/\/www.ccis.northeastern.edu\/people\/triet-vo-huu\/\">Triet Vo-Huu<\/a>, <a href=\"https:\/\/www.ccis.northeastern.edu\/people\/ken-block\/\">Ken Block<\/a> and <a href=\"http:\/\/www.ccs.neu.edu\/home\/amirali\/\">Amirali Sanatinia<\/a> at Northeastern University, in a field called \u201c<a href=\"https:\/\/doi.org\/10.1007\/3-540-68697-5_9\">side-channel attacks<\/a>,\u201d uncovers ways that apps can avoid or escape those restrictions. We have revealed how a phone can listen in on a user\u2019s finger-typing to discover a secret password \u2013 and how simply carrying a phone in your pocket can tell data companies where you are and where you\u2019re going.<\/p>\n<h2>Making assumptions about attacks<\/h2>\n<p>When designing protection for a device or a system, people make assumptions about what threats will occur. Cars, for instance, are designed to protect their occupants from crashes with other cars, buildings, guardrails, telephone poles and other objects commonly found in or near roads. They\u2019re not designed to keep people safe in cars driven off a cliff or smashed by huge rocks dropped on them. It\u2019s just not cost-effective to engineer defenses against those threats, because they\u2019re assumed to be extremely uncommon.<\/p>\n<p>Similarly, people designing software and hardware make assumptions about what hackers might do. But that doesn\u2019t mean devices are safe. One of the first side-channel attacks was identified back in 1996 by cryptographer Paul Kocher, who showed he could break popular and supposedly secure cryptosystems by <a href=\"https:\/\/doi.org\/10.1007\/3-540-68697-5_9\">carefully timing how long it took<\/a> a computer to decrypt an encrypted message. The cryptosystem designers hadn\u2019t imagined that an attacker would take that approach, so their system was vulnerable to it.<\/p>\n<p>There have been many other attacks through the years using all sorts of different approaches. The recent <a href=\"https:\/\/meltdownattack.com\/\">Meltdown and Spectre<\/a> vulnerabilities that exploit design flaws in computer processors, are also side-channel attacks. They enable malicious applications to snoop on other applications\u2019 data in the computer memory. <\/p>\n<h2>Monitoring on the go<\/h2>\n<p>Mobile devices are perfect targets for this sort of attack from an unexpected direction. They are <a href=\"https:\/\/source.android.com\/devices\/sensors\/sensor-types\">stuffed with sensors<\/a>, usually including at least one accelerometer, a gyroscope, a magnetometer, a barometer, up to four microphones, one or two cameras, a thermometer, a pedometer, a light sensor and a humidity sensor.<\/p>\n<p>Apps can access most of these sensors without asking for permission from the user. And by combining readings from two or more devices, it\u2019s often possible to do things that users, phone designers and app creators alike may not expect.<\/p>\n<p>In <a href=\"https:\/\/dl.acm.org\/citation.cfm?doid=2627393.2627417\">one recent project<\/a>, we developed an app that could determine what letters a user was typing on a mobile phone\u2019s on-screen keyboard \u2013 without reading inputs from the keyboard. Rather, we combined information from the phone\u2019s gyroscope and its microphones.<\/p>\n<p>When a user taps on the screen in different locations, the phone itself rotates slightly in ways that can be measured by the <a href=\"https:\/\/learn.sparkfun.com\/tutorials\/gyroscope\/all\">three-axis micromechanical gyroscopes<\/a> found in most current phones. Further, tapping on a phone screen produces a sound that can be recorded on each of a phone\u2019s multiple microphones. A tap close to the center of the screen will not move the phone much, will reach both microphones at the same time, and will sound roughly the same to all the microphones. However, a tap at the bottom left edge of the screen will rotate the phone left and down; it will reach the left microphone faster; and it will sound louder to microphones near the bottom of the screen and quieter to microphones elsewhere on the device.<\/p>\n<p>Processing the movement and sound data together let us determine what key a user pressed, and we were right over 90 percent of the time. This sort of function could be added secretly to any app and could run unnoticed by a user.<\/p>\n<h2>Identifying a location<\/h2>\n<p>We then wondered whether a malicious application could infer a user\u2019s whereabouts, including where they lived and worked, and what routes they traveled \u2013 information most people consider very private.<\/p>\n<p>We wanted to find out whether a user\u2019s location could be identified using only sensors that don\u2019t require users\u2019 permission. The route taken by a driver, for instance, can be simplified into a series of turns, each in a certain direction and with a certain angle. With another app, we used a phone\u2019s compass to observe the person\u2019s direction of travel. That app also used the phone\u2019s gyroscope, measuring the sequence of turn angles of the route traveled by the user. And the accelerometer showed whether a user was stopped, or moving. <\/p>\n<p>By measuring a sequence of turns, and stringing them together as a person travels, we could make a map of their movements. (In our work, we knew which city we were tracking people through, but a similar approach could be used to figure out what city a person was in.) <\/p>\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/204660\/original\/file-20180202-19925-l501qg.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/204660\/original\/file-20180202-19925-l501qg.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\"><\/a><figcaption>\n              <span class=\"caption\">Matching the route of a smartphone with a trip through Boston.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.google.com\/maps\/dir\/42.3470281,-71.0987153\/42.3370778,-71.0897429\/@42.3420599,-71.1012985,16z\/am=t\/data=!3m1!4b1!4m9!4m8!1m5!3m4!1m2!1d-71.1020206!2d42.3414756!3s0x89e379f4bcf581f7:0x79d33d7b8d6345e4!1m0!3e0\">Screenshot of Google Maps<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>Imagine we observe a <a href=\"https:\/\/www.google.com\/maps\/dir\/42.3470281,-71.0987153\/42.3370778,-71.0897429\/@42.3424719,-71.0982838,16z\/data=!4m9!4m8!1m5!3m4!1m2!1d-71.1020206!2d42.3414756!3s0x89e379f4bcf581f7:0x79d33d7b8d6345e4!1m0!3e0\">person in Boston heading southwest<\/a>, turning 100 degrees to the right, making a sharp U-turn to the left to head southeast, turning slightly to the right, continuing straight, then following a shallow curve to the left, a quick jog to the right, bumping up and down more than usual on a road, turning 55 degrees right, and turning 97 degrees left and then making a slight curve right before stopping.<\/p>\n<p>We developed an algorithm to match those movements up against a digitized map of the streets of the city the user was in, and determined which were the most likely routes a person might take. Those movements could identify a route driving from Fenway Park, along the Back Bay Fens, past the Museum of Fine Arts and arriving at Northeastern University.<\/p>\n<p>We were even able to refine our algorithm to incorporate information about curves in roads and speed limits to help narrow options. We produced our results as a <a href=\"https:\/\/doi.org\/10.1109\/MSP.2017.25\">list of possible paths<\/a> ranked by how likely the algorithm thought they were to match the actual route. About half the time, in most cities we tried, the real path a user followed was in the top 10 items on the list. Further refining the map data, sensor readings and the matching algorithm could substantially improve our accuracy. Again, this type of capability could be added to any app by a malicious developer, letting innocent-appearing apps snoop on their users. <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/65443\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/>Our research group is continuing to investigate how side-channel attacks can be used to reveal a variety of private information. For instance, measuring how a phone moves when its owner is walking could suggest how old a person is, whether they are male (with the phone in a pocket) or female (typically with the phone in a purse), or even health information about how steady a person is on his feet or how often she stumbles. We assume there is more your phone can tell a snoop \u2013 and we hope to find out what, and how, to protect against that sort of spying.<\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/guevara-noubir-299586\">Guevara Noubir<\/a>, Professor of Computer and Information Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/northeastern-university-1644\">Northeastern University<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/your-mobile-phone-can-give-away-your-location-even-if-you-tell-it-not-to-65443\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guevara Noubir, Northeastern University U.S. military officials were recently caught off guard by revelations that servicemembers\u2019 digital fitness trackers were storing the locations of their workouts \u2013 including at or near military bases and clandestine sites around the world. But this threat is not limited to Fitbits and similar devices. My group\u2019s recent research has [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":11290,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[527,1211,3989,3988,881,525,3987,487],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/11289"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=11289"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/11289\/revisions"}],"predecessor-version":[{"id":11291,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/11289\/revisions\/11291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/11290"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=11289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=11289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=11289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}