An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism

Thumbnail Image

Date

2024-04-01

Journal Title

Journal ISSN

Volume Title

Publisher

IEEE Internet of Things Journal

Abstract

We present a thorough security analysis of a recent smartwatch authentication mechanism called CirclePIN, which was considered resilient to several attacks, including shoulder surfing and video recording. This mechanism avoids the direct entry of the personal identification number (PIN) by using consecutive screens of random colors that fool the attacker. We disclose a vulnerability in CirclePIN inherent to the way in which the users match the random colors to their PINs’ digits and we illustrate how to exploit it with an intersection attack. This attack uses the information extracted from multiple video recordings of legitimate authentication sessions. We prove that it has a high probability of revealing the user PIN with only three video recordings and always succeeds with five. Our proof is twofold. We formulate the theoretical probability of success for the attack as a function of the number of available video recordings. Then, we validate this formula with a simulation of a large number of attacks to compute their experimental probability of success. In our estimation, manual information extraction takes around 1 min per exploitable video recording. So, a complete intersection attack is cost effective in terms of time, as it lasts 5 min or less.

Description

Keywords

Citation

D. Chefrour, Y. Sedira and S. Chabbi, "An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism," in IEEE Internet of Things Journal, vol. 11, no. 7, pp. 12485-12494, 1 April1, 2024, doi: 10.1109/JIOT.2023.3333964.

Collections

Endorsement

Review

Supplemented By

Referenced By