IE 11 is not supported. For an optimal experience visit our site on another browser.

Fingerprint smudges thwart smart phone security

You might think that the data and information stored on your smart phone is protected by the clever passcode you created, but researchers have determined that it's possible to crack the passcode based on the oily smudges your fingers leave behind.
/ Source: PC World

Smart phones have relatively large storage capacities for devices that are so easily lost or stolen. You might think that the data and information stored on your smart phone is protected by the clever passcode you created, but researchers have determined that it's possible to crack the passcode based on the oily smudges your fingers leave behind.

A team of researchers from the University of Pennsylvania presented a paper titled "Smudge Attacks on Smartphone Touch Screens" at WOOT '10 — the fourth Usenix Workshop on Offensive Technologies conference in Washington D.C. recently. The researchers describe a method for uncovering the smart phone password based on the fingerprints on the touchscreen.

The research paper explains "Oily residues, or smudges, on the touch screen surface, are one side effect of touches from which frequently used patterns such as a graphical password might be inferred." Bottom line — because your fingers leave oily smudges, an attacker can possibly determine where your fingers have been on the touch screen and break your password.

The research team lists three reasons that smudge attacks are a threat to smart phone security. "First, smudges are surprisingly persistent in time. Second, it is surprisingly difficult to incidentally obscure or delete smudges through wiping or pocketing the device. Third and finally, collecting and analyzing oily residue smudges can be done with readily available equipment such as a camera and a computer."

According to the research paper, the team found the results of their testing to be "extremely encouraging. IT admins and smart phone owners, however, might interpret the findings as discouraging.

"In one experiment, the pattern was partially identifiable in 92 percent and fully in 68 percent of the tested lighting and camera setups. Even in our worst performing experiment, under less than ideal pattern entry conditions, the pattern can be partially extracted in 37 percent of the setups and fully in 14 percent of them."

The security risk is present on all touchscreen smart phones to some extent, but it is a much bigger risk on Android devices that rely on a swipe pattern rather than the more traditional numeric or alphanumeric PIN.

Android displays a pattern of nine circles and lets the user create a passcode based on how they connect the dots. Because the pattern is completed without lifting your finger off of the display, the oily smudges show which circles are part of the passcode, and also betray the order or pattern traced by the smart phone owner's finger.

In contrast, an attacker might be able to determine where an iPhone owner's fingers have touched the screen, but not which order the numbers or letters were entered. The attacker would also not necessarily be able to determine if the same number or letter is repeated within the password, or how many times it is repeated.

Still, whether you use an Android smart phone, an iPhone, or some other touchscreen smart phone, the findings presented by this research team raise concerns over the effectiveness of touchscreen passcodes. I guess it's time to invest in some screen cleaning wet wipes.