- Security TWENTY
- Women in Security
A new privacy threat from devices such as smartphones, smart doorbells and voice assistants allows cyber attackers to access and combine device identification and biometric information, according to academic researchers.
Over a month, computer scientists collected and analysed 30,000 biometric samples from over 50 users and 100,000 device IDs. Their findings suggest that identity leakages from devices allow cyber attackers to correlate device IDs and biometric info, to profile users in the cyber and physical domains. Using the samples, computer scientists were able to de-anonymise over 70 per cent of device IDs (such as smartphone MAC addresses) and harvest the biometric information (facial images or voices) of device users with 94pc accuracy.
Although single modal identity leakage – the leakage of information from one source or device – is well studied, this is the first time a new privacy issue of cross-modal identity leakage has been observed, the researchers say.
With the `Internet of Things’ becoming an increasing reality devices such as smartphones, smart thermostats, smart lightbulbs, speakers and virtual assistants are running into the billions. In buildings, for example a smart doorbell, can be outfitted with several sensors (cameras, microphones, WiFi). This, however, spawns an increased opportunity for many multi-modal sensing scenarios that can be maliciously used by cyber attackers, the researchers warn from the University of Liverpool, New York University, The Chinese University of Hong Kong, and University at Buffalo SUNY.
Dr Chris Xiaoxuan Lu, with Liverpool’s Department of Computer Science who led the study, said: “This is an important new study which confirms the concern presented by numerous IoT devices and unveils a compound identity leak from the combined side channels between human biometrics and device identities.
“Technically, we present a data-driven attack vector that robustly associates physical biometrics with device IDs under substantial sensing noise and observation disturbances.
“These findings have wider implications for policy makers in IT laws and for IoT manufacturers who need to look into this new privacy threat in their products.
“To date there is not good enough countermeasures against such new attacks and all possible mitigation will inevitably undermine user experience of IoT devices.”
The research team is now working with the IT law researchers to scope out new policies for IoT manufacturers. Meanwhile on the technology side, they are also investigating how to effectively detect hidden electronic devices (e.g., spy cameras and microphones) with consumer smartphones.”
The study `Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices” can be accessed at https://arxiv.org/abs/2001.08211.