Poster:Watch out your smartwatch when paired

Youngjoo Lee, Won Seok Yang, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We coin a new term called data transfusion as a phenomenon that a user experiences when pairing a wearable device with the host device. A large amount of data stored in the host device (e.g., a smartphone) is forcibly copied to the wearable device (e.g., a smart watch) due to pairing while the wearable device is usually less a.ended. To the best of knowledge, there is no previous work that manipulates how sensitive data is transfused even without user's consent and how users perceive and behave regarding such a phenomenon for smart watches. We tackle this problem by conducting an experimental study of data extraction from commodity devices, such as in Android Wear, watchOS, and Tizen platforms, and a following survey study with 205 smart watch users, in two folds. .e experimental studies have shown that a large amount of sensitive data was transfused, but there was not enough user noti.cation. .e survey results have shown that users have lower perception on smart watches for security and privacy than smartphones, but they tend to set the same passcode on both devices when needed. Based on the results, we perform risk assessment and discuss possible mitigation that involves volatile transfusion.

Original languageEnglish
Title of host publicationCCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages2527-2529
Number of pages3
ISBN (Electronic)9781450349468
DOIs
Publication statusPublished - 2017 Oct 30
Event24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 - Dallas, United States
Duration: 2017 Oct 302017 Nov 3

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017
Country/TerritoryUnited States
CityDallas
Period17/10/3017/11/3

Bibliographical note

Funding Information:
.is work was partly supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2 015R1A2A2A01004792), and also by the MSIT under the ITRC (Information Technology Research Center) support program(IITP-2017-2012-0-00646).

Publisher Copyright:
© 2017 author(s).

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Poster:Watch out your smartwatch when paired'. Together they form a unique fingerprint.

Cite this