Overview
Explore a novel fingerprinting attack on sensor data called calibration fingerprinting in this IEEE conference talk. Delve into how per-device factory calibration data can be inferred from careful analysis of sensor output alone, without direct access to calibration parameters. Examine the potential of this attack through demonstrations on inertial measurement unit sensors in iOS and Android devices. Learn how this method requires minimal sensor data samples, takes less than a second to process, and produces a device fingerprint that remains consistent over time and after factory resets. Discover the high effectiveness of this approach, particularly for iOS devices, with an estimated 67 bits of entropy in the fingerprint for iPhone 6S devices. Investigate the applicability of this technique to accelerometers in Google Pixel 2 and Pixel 3 devices. Consider the implications of this attack vector for mobile device security and privacy.
Syllabus
Intro
Device Fingerprinting
Motion Sensor Calibration
Sensor Calibration Fingerprinting
Generation of the Calibration Fingerprint
Calibration Fingerprint for Magnetometer
Sensor Uniqueness Analysis
Countermeasures
Taught by
IEEE Symposium on Security and Privacy