{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:08:39Z","timestamp":1755997719495,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T00:00:00Z","timestamp":1515369600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,1,8]]},"abstract":"<jats:p>Demand for smartwatches has taken off in recent years with new models which can run independently from smartphones and provide more useful features, becoming first-class mobile platforms. One can access online banking or even make payments on a smartwatch without a paired phone. This makes smartwatches more attractive and vulnerable to malicious attacks, which to date have been largely overlooked. In this paper, we demonstrate Snoopy, a password extraction and inference system which is able to accurately infer passwords entered on Android\/Apple watches within 20 attempts, just by eavesdropping on motion sensors. Snoopy uses a uniform framework to extract the segments of motion data when passwords are entered, and uses novel deep neural networks to infer the actual passwords. We evaluate the proposed Snoopy system in the real-world with data from 362 participants and show that our system offers a ~ 3-fold improvement in the accuracy of inferring passwords compared to the state-of-the-art, without consuming excessive energy or computational resources. We also show that Snoopy is very resilient to user and device heterogeneity: it can be trained on crowd-sourced motion data (e.g. via Amazon Mechanical Turk), and then used to attack passwords from a new user, even if they are wearing a different model.<\/jats:p>\n          <jats:p>This paper shows that, in the wrong hands, Snoopy can potentially cause serious leaks of sensitive information. By raising awareness, we invite the community and manufacturers to revisit the risks of continuous motion sensing on smart wearable devices.<\/jats:p>","DOI":"10.1145\/3161196","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T13:26:11Z","timestamp":1515504371000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Snoopy"],"prefix":"10.1145","volume":"1","author":[{"given":"Chris Xiaoxuan","family":"Lu","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, UK"}]},{"given":"Bowen","family":"Du","sequence":"additional","affiliation":[{"name":"University of Warwick, Department of Computer Science, Coventry, USA"}]},{"given":"Hongkai","family":"Wen","sequence":"additional","affiliation":[{"name":"University of Warwick, Department of Computer Science, Coventry, USA"}]},{"given":"Sen","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Heriot-Watt University, Oxford, UK"}]},{"given":"Andrew","family":"Markham","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, UK"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, UK"}]},{"given":"Yiran","family":"Shen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China"}]},{"given":"Niki","family":"Trigoni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,1,8]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1145\/2789168.2790109"},{"unstructured":"Ltd Alipay.com Co. 2017. Alipay - Makes Life Easy. https:\/\/itunes.apple.com\/us\/app\/alipay-makes-life-easy\/id333206289?mt=8. (2017).  Ltd Alipay.com Co. 2017. Alipay - Makes Life Easy. https:\/\/itunes.apple.com\/us\/app\/alipay-makes-life-easy\/id333206289?mt=8. (2017).","key":"e_1_2_1_2_1"},{"unstructured":"Daniel Amitay. 2014. Most Common iPhone Passcodes. http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes. (2014).  Daniel Amitay. 2014. Most Common iPhone Passcodes. http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes. (2014).","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","volume-title":"Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv , Katherine L Gibson , Evan Mossop , Matt Blaze , and Jonathan M Smith . 2010 . Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies , Woot (2010). Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies, Woot (2010)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1145\/2420950.2420957"},{"unstructured":"Baidu. 2016. Offline Alipay Setup. http:\/\/jingyan.baidu.com\/article\/ce4366492b02263773afd3f0.html. (2016).  Baidu. 2016. Offline Alipay Setup. http:\/\/jingyan.baidu.com\/article\/ce4366492b02263773afd3f0.html. (2016).","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX.","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen . 2011 . TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion .. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX. Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX."},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"e_1_2_1_9_1","volume-title":"Keras: Deep learning library for theano and tensorflow. URL: https:\/\/keras.io\/k","author":"Fran\u00e7ois Chollet","year":"2015","unstructured":"Fran\u00e7ois Chollet et al. 2015 . Keras: Deep learning library for theano and tensorflow. URL: https:\/\/keras.io\/k (2015). Fran\u00e7ois Chollet et al. 2015. Keras: Deep learning library for theano and tensorflow. URL: https:\/\/keras.io\/k (2015)."},{"key":"e_1_2_1_10_1","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","author":"Duchi John","year":"2011","unstructured":"John Duchi , Elad Hazan , and Yoram Singer . 2011 . Adaptive subgradient methods for online learning and stochastic optimization . Journal of Machine Learning Research 12 , Jul (2011), 2121 -- 2159 . John Duchi, Elad Hazan, and Yoram Singer. 2011. Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research 12, Jul (2011), 2121--2159.","journal-title":"Journal of Machine Learning Research 12"},{"unstructured":"Thomas Graziani. 2016. smartwatch report. https:\/\/walkthechat.com\/apple-watch-wechat-are-adding-further-integrated-features\/. (2016).  Thomas Graziani. 2016. smartwatch report. https:\/\/walkthechat.com\/apple-watch-wechat-are-adding-further-integrated-features\/. (2016).","key":"e_1_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1145\/2858036.2858267"},{"unstructured":"Karl Moritz Hermann Tomas Kocisky Edward Grefenstette Lasse Espeholt Will Kay Mustafa Suleyman and Phil Blunsom. 2015. Teaching machines to read and comprehend. In Advances in Neural Information Processing Systems NIPS.  Karl Moritz Hermann Tomas Kocisky Edward Grefenstette Lasse Espeholt Will Kay Mustafa Suleyman and Phil Blunsom. 2015. Teaching machines to read and comprehend. In Advances in Neural Information Processing Systems NIPS.","key":"e_1_2_1_13_1"},{"unstructured":"Sepp Hochreiter Yoshua Bengio Paolo Frasconi and J\u00fcrgen Schmidhuber. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies. (2001).  Sepp Hochreiter Yoshua Bengio Paolo Frasconi and J\u00fcrgen Schmidhuber. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies. (2001).","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","volume-title":"Long short-term memory. 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. 9, 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. 9, 8 (1997), 1735--1780."},{"unstructured":"Diederik Kingma and Jimmy Ba. 2014. Adam:A method for stochastic optimization.InInternational Conferenceon Learning Representations ICLR.  Diederik Kingma and Jimmy Ba. 2014. Adam:A method for stochastic optimization.InInternational Conferenceon Learning Representations ICLR.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","volume-title":"Anirudh Goyal, Yoshua Bengio, Hugo Larochelle, Aaron Courville, et al.","author":"Krueger David","year":"2017","unstructured":"David Krueger , Tegan Maharaj , J\u00e1nos Kram\u00e1r , Mohammad Pezeshki , Nicolas Ballas , Nan Rosemary Ke , Anirudh Goyal, Yoshua Bengio, Hugo Larochelle, Aaron Courville, et al. 2017 . Zoneout : Regularizing rnns by randomly preserving hidden activations. (2017). David Krueger, Tegan Maharaj, J\u00e1nos Kram\u00e1r, Mohammad Pezeshki, Nicolas Ballas, Nan Rosemary Ke, Anirudh Goyal, Yoshua Bengio, Hugo Larochelle, Aaron Courville, et al. 2017. Zoneout: Regularizing rnns by randomly preserving hidden activations. (2017)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1038\/nature14539"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1145\/2976749.2978397"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1145\/2973750.2973752"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1145\/2810103.2813668"},{"unstructured":"Marte Dybevik L\u00f8ge. 2015. Tell Me Who You Are and I Will Tell You Your Unlock Pattern. Master's thesis. NTNU.  Marte Dybevik L\u00f8ge. 2015. Tell Me Who You Are and I Will Tell You Your Unlock Pattern. Master's thesis. NTNU.","key":"e_1_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1145\/2897845.2897905"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/2046707.2046771"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1109\/ISIT.1994.394764"},{"key":"e_1_2_1_26_1","volume-title":"International Journal of Information Security","author":"Mehrnezhad Maryam","year":"2017","unstructured":"Maryam Mehrnezhad , Ehsan Toreini , Siamak F. Shahandashti , and Feng Hao . 2017. Stealing PINs via mobile sensors: actual risk versus user perception . International Journal of Information Security ( 2017 ). Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. 2017. Stealing PINs via mobile sensors: actual risk versus user perception. International Journal of Information Security (2017)."},{"key":"e_1_2_1_27_1","volume-title":"Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security.","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security."},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1145\/2307636.2307666"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_2_1_30_1","volume-title":"Globally, by","author":"Research Allied Market","year":"2020","unstructured":"Allied Market Research . 2016. Smartwatch Market is Expected to Reach 32.9 Billion , Globally, by 2020 . https:\/\/goo.gl\/DJjHYs. (2016). Allied Market Research. 2016. Smartwatch Market is Expected to Reach 32.9 Billion, Globally, by 2020. https:\/\/goo.gl\/DJjHYs. (2016)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1145\/2500423.2500434"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1145\/2660267.2660360"},{"key":"e_1_2_1_33_1","volume-title":"USENIX Symposium On Usable Privacy and Security, SOUPS.","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The password life cycle: user behaviour in managing passwords . In USENIX Symposium On Usable Privacy and Security, SOUPS. Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In USENIX Symposium On Usable Privacy and Security, SOUPS."},{"unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems NIPS.  Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems NIPS.","key":"e_1_2_1_34_1"},{"unstructured":"TechRadar. 2015. Sony Smartwatch 3 review. http:\/\/www.techradar.com\/reviews\/sony-smartwatch-3. (2015).  TechRadar. 2015. Sony Smartwatch 3 review. http:\/\/www.techradar.com\/reviews\/sony-smartwatch-3. (2015).","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","volume-title":"Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning","author":"Tieleman Tijmen","year":"2012","unstructured":"Tijmen Tieleman and Geoffrey Hinton . 2012. Lecture 6.5-rmsprop : Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning ( 2012 ). Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning (2012)."},{"key":"e_1_2_1_37_1","volume-title":"International Journal of Human--Computer Interaction","author":"Turner Colton J","year":"2017","unstructured":"Colton J Turner , Barbara S Chaparro , and Jibo He. 2017. Text input on a smartwatch QWERTY keyboard: tap vs. trace . International Journal of Human--Computer Interaction ( 2017 ). Colton J Turner, Barbara S Chaparro, and Jibo He. 2017. Text input on a smartwatch QWERTY keyboard: tap vs. trace. International Journal of Human--Computer Interaction (2017)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1145\/2508859.2516700"},{"doi-asserted-by":"publisher","key":"e_1_2_1_39_1","DOI":"10.1145\/2493190.2493231"},{"doi-asserted-by":"publisher","key":"e_1_2_1_40_1","DOI":"10.1145\/2789168.2790121"},{"doi-asserted-by":"publisher","key":"e_1_2_1_41_1","DOI":"10.1109\/IPSN.2014.6846747"},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_2_1_43_1","volume-title":"Ben Taylor, and Zheng Wang.","author":"Ye Guixin","year":"2017","unstructured":"Guixin Ye , Zhanyong Tang , Dingyi Fang , Xiaojiang Chen , Kwang In Kim , Ben Taylor, and Zheng Wang. 2017 . Cracking Android pattern lock in five attempts. (2017). Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang. 2017. Cracking Android pattern lock in five attempts. (2017)."},{"unstructured":"Wojciech Zaremba Ilya Sutskever and Oriol Vinyals. 2014. Recurrent neural network regularization. (2014).  Wojciech Zaremba Ilya Sutskever and Oriol Vinyals. 2014. Recurrent neural network regularization. (2014).","key":"e_1_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3161196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3161196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:30Z","timestamp":1750212810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3161196"}},"subtitle":["Sniffing Your Smartwatch Passwords via Deep Sequence Learning"],"short-title":[],"issued":{"date-parts":[[2018,1,8]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,1,8]]}},"alternative-id":["10.1145\/3161196"],"URL":"https:\/\/doi.org\/10.1145\/3161196","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2018,1,8]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}