02.06.2013 Views

Editor's note

Editor's note

Editor's note

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

This partly comes down to the action involved, as the<br />

drawing of the secret gives an observer a continuous<br />

action to watch rather than a series of taps (which are<br />

more difficult to keep track of if you’re trying to watch<br />

what someone else is doing). Also, if a would-be<br />

impostor actually has sight of the user’s screen, then<br />

they may be a glimpse of the overall pattern itself, as<br />

depicted in Figure 2. Although Android offers an option<br />

to make the entry of the pattern invisible, this actually<br />

becomes quite difficult for the authorized user to follow<br />

(i.e. to keep track of their position in a long pattern) and<br />

to tell if they are doing it right. The option to enable<br />

tactile feedback (by means of small vibrations) does<br />

provide some help here to an extent, but it’s still easy to<br />

make a mistake.<br />

Once an impostor gets hold of a device, then it’s<br />

sometimes possible to determine the unlock pattern from<br />

the smudges and smears that the owner’s fingers have<br />

left on the screen. In fact, my first practical encounter<br />

with the pattern unlock technique was when a one of my<br />

students had popped out of the room and left his phone on<br />

the table. One of his ‘friends’ then picked it up, looked at<br />

the screen, determined the unlock pattern … and quickly<br />

changed it to something else. Although it was all done in<br />

fun on this occasion, it was a fairly clear illustration of the<br />

vulnerability. The feasibility of such attacks has also been<br />

recognized in the research community, with academics<br />

from the University of Pennsylvania having published a<br />

detailed paper on the topic (Aviv, A.J., Gibson, K., Mossop,<br />

E., Blaze, M. and Smith, J.M. 2010. Smudge Attacks on<br />

Smartphone Touch Screens, in 4th USENIX Workshop<br />

on Offensive Technologies (WOOT’10), Washington DC,<br />

9 August 2010. http://www.usenix.org/events/woot10/<br />

tech/full_papers/Aviv.pdf).<br />

In the same way that they can choose guessable<br />

PINs, there is a risk of users having a tendency towards<br />

predictable patterns (indeed,<br />

users already do this with<br />

PINs, with Amitay’s study<br />

revealing ‘2580’ to be the third<br />

most popular choice – not an<br />

obviously memorable number<br />

until you look at the pattern it<br />

traces out on the keypad). In<br />

addition, there’s a reduced<br />

set of permutations compared<br />

to an equivalent length PIN,<br />

because each elements of<br />

the pattern are more likely to<br />

adjacent to each other (they<br />

don’t have to be, but it’s more<br />

likely to happen as a result of<br />

the way that many users will<br />

starterkit 02/2011(2)<br />

MOBILE PENTESTING<br />

draw them), and unlike the digits in PIN, the positions<br />

in the pattern cannot be repeated. Having said this, the<br />

range of valid permutations is still sufficient to ensure<br />

that users have the chance to select patterns that are<br />

far from trivial to break or predictable to guess.<br />

On the positive side, the use of a pattern helps to<br />

guard against sharing – it’s hard to describe your<br />

pattern to someone when compared to a passing on a<br />

password or PIN, and so a user would have to spend<br />

time showing someone. However, users may also find<br />

long patterns potentially more difficult to remember<br />

than a numerical sequence of equivalent length,<br />

because they don’t have the opportunity to remember<br />

the information as a meaningful string in its own right.<br />

However, it is arguable that users with better visual/task<br />

memory will find the action of recalling and recreating<br />

the pattern to be an easier proposition.<br />

In addition to the pattern lock, the latest version of<br />

Android, Ice Cream Sandwich (ICS), has taken things<br />

further with introduction of face recognition. This<br />

leverages the handset’s front-facing camera to enable<br />

the phone to unlock when it sees its owner. However, no<br />

sooner had this appeared than coverage and commentary<br />

started to suggest potential problems, such as the risk of<br />

being able to fool the mechanism by showing it a photo<br />

of the legitimate user, or difficulty of using it in low light<br />

conditions (Kaelin, L. 2011. Android’s face unlock feature<br />

could be fooled by photo, TechSpot, 21 October 2011.<br />

http://www.techspot.com/news/45953-androids-faceunlock-feature-could-be-fooled-by-photo.html).<br />

Given the<br />

right lighting, however, it operates very effectively and<br />

can certainly be accomplished more quickly and with<br />

less effort than entering a PIN or a pattern.<br />

Although faults might be leveled at each of the<br />

techniques in isolation, a key thing is that Android offers<br />

a range of options. So, from a usability perspective, the<br />

Figure 3. Variations of the iOS passcode (a) Simple (b) numeric-only and (c) full character set<br />

Page 20 http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!