A study by computer scientists at the University of Liverpool has revealed a new privacy threat from devices such as smartphones, smart doorbells and voice assistants that allows cyber attackers to access and combine device identification and biometric information.
Over a one month period, computer scientists collected and analysed over 30,000 biometric samples from over 50 users and over 100,000 different device IDs, to find that identity leakages from different devices allow cyber attackers to correlate device IDs and biometric information to profile users in both cyber and physical domains, posing a significant online privacy and security threat.
Using the samples, computer scientists were able to de-anonymize over 70% device IDs (e.g. smartphone MAC addresses) and harvest the biometric information (facial images or voices) of device users with 94% accuracy.
Although single modal identity leakage – the leakage of information from one source or device – is well studied, this is the first time a new privacy issue of cross-modal identity leakage has been observed revealing an unprecedented threat in environments with multiple different sensors.
With the `Internet of Things’ becoming an increasing reality devices such as smartphones, smart thermostats, smart lightbulbs, speakers and virtual assistants are far more common. In addition, there are Increasingly rich sets of sensors in smart buildings and on smart devices. For example, a smart doorbell today can be outfitted with more than 9 different sensors (e.g. cameras, microphones, WiFi etc).
This, however, spawns an increased opportunity for many multi-modal sensing scenarios that can be maliciously leveraged by cyber attackers.
Dr Chris Xiaoxuan Lu, with the University of Liverpool’s Department of Computer Science who led the study, said: “This is an important new study which confirms the concern presented by numerous IoT devices and unveils a compound identity leak from the combined side channels between human biometrics and device identities.
“Technically, we present a data-driven attack vector that robustly associates physical biometrics with device IDs under substantial sensing noise and observation disturbances.
“These findings have wider implications for policy makers in IT laws and for IoT manufacturers who need to look into this new privacy threat in their products.
“To date there is not good enough countermeasures against such new attacks and all possible mitigation will inevitably undermine user experience of IoT devices.”
The research team is now working with the IT law researchers to scope out new policies for IoT manufacturers. Meanwhile on the technology side, they are also investigating how to effectively detect hidden electronic devices (e.g., spy cameras and microphones) with consumer smartphones.”
The study `Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices” can be accessed here >>>>.
It involved researchers from the University of Liverpool, New York University, The Chinese University of Hong Kong, and University at Buffalo SUNY.
All recent news
Virtual events and activities to take part in this week: 26 – 31 May 2020
Student Services launch survey to help improve wellbeing support for students
Obituary: Benny Pollack
Risk factors associated with severe and fatal cases of COVID-19 identified
Architecture academics on the view from your lockdown window
In our NEW blog @MeredithCrowle1 and Dr Lu Han look at whether 'level playing fields' will derail the Brexit negotiations.
READ it here 🔻
@stjohnscam @Cambridge_Uni @UoLManSchool @LivUni @livuninews
Our Developmental Economist, Dr @SGarikipat @UoLManSchool is distributing food and other resources to #India's migrant labourer families and individuals cut adrift by #COVIDー19 - can you help?
1/ Today, we are launching our 10th COVID-19 Policy Brief with @LpoolCityRegion, a paper by Alex Nurse & Richard Dunning, Planning Lecturers @livuniplanning, entitled ‘Cycling & walking - a faster route to a safer & stronger Liverpool City Region’