Hackers could use tactile interactions to access valuable data



[ad_1]

July 10, 2018 • Security, Top Stories

  Hackers could use tactile interactions to access valuable data (Source: http://dare2go.com/) hackers could use tactile interactions to access valuable data (Source: http://dare2go.com/)</p>
</div>
<p>A team of cybersecurity researchers at Ben Gurion University of the Negev (BGU) has demonstrated that Valuable information about users can be filtered out by following the touch gestures of smartphones to impersonate a user. touch screens of third parties when sending e-mails, financial transactions or even games. </p>
<p>  Broken smart phone touch screens are often replaced by replacement components made by third-party manufacturers whose circuit contains malicious code. [19659005] "Our research goal was to use machine learning to determine the amount of high-level contextual information that the attacker can get by observing and predicting the touch of the word." User, reen interactions, "said Yossi Oren, a researcher in the BGU department of software engineering and information systems." If an attacker can understand the context of certain events, he can use the information to create a more effective custom attack. "</p>
<p>  For example, a hacker can learn when to steal user information or how to hack the phone by inserting malicious programs. Tactile interaction of users running many different applications to quantify the amount of high-level contextual information. In a series of questions and games, the researchers used machine learning to determine the velocity, duration, and intervals of stroke on specially modified LG Nexus phones. </p>
<p>  According to the researchers, the results of machine learning demonstrate an accuracy rate of 92%. "Now that we have validated the ability to obtain high-level contextual information based solely on tactile events, we recognize that touch-injection attacks are a greater potential threat," Oren said. "By using this badysis defensively, we can also stop attacks by identifying abnormalities in the typical use of a phone and prevent unauthorized or malicious use of the phone." </p>
<p>  Oren presented the results of the Second International Symposium on Cybersecurity, Cryptography and Learning) June 21-22 in Beersheba, Israel. The results were published by Springer in the lecture notes on computer science. The research team includes undergraduate students BGU Moran Azaran, Niv Ben-Shabat and Tal Shkonik </p>
<p>  <strong> Edited by Daniëlle Kruger </strong> </p>
<p>  <span style= Daniëlle Kruger on Twitter

Follow IT News Africa on Twitter

Ben-Gurion University News ITMobileMobile SecuritySecuritiesmartphone securitysmartphone touchscreenstech newstechnologytechnology news

"Getting ready is the key to mitigating cyberattacks The rise of the online streaming service in South Africa "

[ad_2]
Source link