Your Wearable Devices Reveal Your Personal PIN

Wearable devices can give away your passwords, according to new research. In the paper "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN" scientists from Binghamton University and the Stevens Institute of Technology combined data from embedded sensors in wearable technologies, such as smartwatches and fitness trackers, along with a computer algorithm to crack private PINs and passwords with 80-percent accuracy on the first try and more than 90-percent accuracy after three tries.

Yan Wang, assistant professor of computer science within the Thomas J. Watson School of Engineering and Applied Science at Binghamton University is a co-author of the study along with Chen Wang, Xiaonan Guo, Bo Liu and lead researcher Yingying Chen from the Stevens Institute of Technology. The group is collaborating on this and other mobile device-related security and privacy projects.

"Wearable devices can be exploited," said Wang. "Attackers can reproduce the trajectories of the user's hand then recover secret key entries to ATM cash machines, electronic door locks and keypad-controlled enterprise servers."

Researchers conducted 5,000 key-entry tests on three key-based security systems, including an ATM, with 20 adults wearing a variety of technologies over 11 months. The team was able to record millimeter-level information of fine-grained hand movements from accelerometers, gyroscopes and magnetometers inside the wearable technologies regardless of a hand's pose. Those measurements lead to distance and direction estimations between consecutive keystrokes, which the team's "Backward PIN-sequence Inference Algorithm" used to break codes with alarming accuracy without context clues about the keypad.

According to the research team, this is the first technique that reveals personal PINs by exploiting information from wearable devices without the need for contextual information.

"The threat is real, although the approach is sophisticated," Wang added. "There are two attacking scenarios that are achievable: internal and sniffing attacks. In an internal attack, attackers access embedded sensors in wrist-worn wearable devices through malware. The malware waits until the victim accesses a key-based security system and sends sensor data back. Then the attacker can aggregate the sensor data to determine the victim's PIN. An attacker can also place a wireless sniffer close to a key-based security system to eavesdrop sensor data from wearable devices sent via Bluetooth to the victim's associated smartphones."

The findings are an early step in understanding security vulnerabilities of wearable devices. Even though wearable devices track health and medical activities, their size and computing power doesn't allow for robust security measures, which makes the data within more vulnerable to attack.

The team did not have a solution for the problem in the current research, but did suggest that developers, "inject a certain type of noise to data so it cannot be used to derive fine-grained hand movements, while still being effective for fitness tracking purposes such as activity recognition or step counts."

The team also suggests better encryption between the wearable device and the host operating system.

Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, and Bo Liu. 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM, New York, NY, USA, 189-200. DOI: http://dx.doi.org/10.1145/2897845.2897847

The paper was published in proceedings of - and received the "Best Paper Award" - at the 11th annual Association for Computing Machinery Asia Conference on Computer and Communications Security (ASIACCS) in Xi'an, China, on May 30-June 3.

The research was funded, in-part, by a grant from the National Science Foundation and the United States Army Research Office.

Most Popular Now

Research Shows AI Technology Improves Pa…

Existing research indicates that the accuracy of a Parkinson's disease diagnosis hovers between 55% and 78% in the first five years of assessment. That's partly because Parkinson's sibling movement disorders...

Who's to Blame When AI Makes a Medi…

Assistive artificial intelligence technologies hold significant promise for transforming health care by aiding physicians in diagnosing, managing, and treating patients. However, the current trend of assistive AI implementation could actually...

First Therapy Chatbot Trial Shows AI can…

Dartmouth researchers conducted the first clinical trial of a therapy chatbot powered by generative AI and found that the software resulted in significant improvements in participants' symptoms, according to results...

DMEA sparks: The Future of Digital Healt…

8 - 10 April 2025, Berlin, Germany. Digitalization is considered one of the key strategies for addressing the shortage of skilled workers - but the digital health sector also needs qualified...

DeepSeek: The "Watson" to Doct…

DeepSeek is an artificial intelligence (AI) platform built on deep learning and natural language processing (NLP) technologies. Its core products include the DeepSeek-R1 and DeepSeek-V3 models. Leveraging an efficient Mixture...

Stepping Hill Hospital Announced as SPAR…

Stepping Hill Hospital, part of Stockport NHS Foundation Trust, has replaced its bedside units with state-of-the art devices running a full range of information, engagement, communications and productivity apps, to...

DMEA 2025: Digital Health Worldwide in B…

8 - 10 April 2025, Berlin, Germany. From the AI Act, to the potential of the European Health Data Space, to the power of patient data in Scandinavia - DMEA 2025...