Deep Learning and NLP based Side Channel Attack for Text Inference in Smartphones
P Uma Maheswari1, Mohamed Yilmaz Ibrahim2, Ramkumar B3, Aswin Sundar4

1Dr. P Uma Maheswari, School of Computer Science and Engineering, CEG, Anna University, Chennai,(T N), India.
2Mohamed Yilmaz Ibrahim*, School of Computer Science and Engineering, CEG, Anna University, Chennai,(T N), India.
3Ramkumar B, School of Computer Science and Engineering, CEG, Anna University, Chennai,(T N), India.
4Aswin Sundar, School of Computer Science and Engineering, CEG, Anna University, Chennai,(T N), India.
Manuscript received on November 23, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 1132-1137 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  B3432129219/2020©BEIESP | DOI: 10.35940/ijeat.B3432.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Over the past years, smartphones have witnessed an alarming rise in embedded sensors which enhance their support for applications. However, they can be regarded as loopholes as seemingly innocuous information can be obtained without any user permissions in Android thus invading the user’s privacy. Our work establishes a side channel attack by illegitimately inferring the information being typed by the user on a smartphone using the readings from ‘zero-permission’ sensors like accelerometer and gyroscope. This serves as a proof of concept to prevent such attacks on mobile devices in the future. While previous research has been conducted in this space, our narrative involves a predictive model using Recurrent Neural Networks that can predict the letters being typed in the keyboard solely based on the motion sensor readings, thus inferring the text. Our research was able to identify 37.5% of the unseen words typed by the user using a very small volume of training data. Our tap detection method has shown 92% accuracy which plays a critical role in the text inference. This research lays the foundation to further progress in this area, thus helping to strengthen the mobile security.
Keywords: Android, Security, Side-channel attack, LST.