• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Slogger

Defense against Smartphone Keyloggers

Recent research shows that it is possible to infer a user’s touchscreen inputs (e.g., passwords) on Android devices based on inertial (motion/position) sensors, currently freely-accessible by any Android app. Figure below shows the high level steps involved in motion based touchstroke logging attack. Given the high accuracies of such touchstroke logging attacks, they are now considered a significant threat to user privacy. Consequently, the security community has started exploring defenses to such side channel attacks, but the suggested solutions are either not effective (e.g., those based on vibrational noise) and/or may significantly undermine system usability (e.g., those based on keyboard layout randomization).

Figure1: Motion-based Touchstroke Logging Attack

Figure1: Motion-based Touchstroke Logging Attack


In this work, we introduce a novel and practical defense to motion-based touchstroke leakage based on system-generated, fully automated and user-oblivious sensory noise. Our defense leverages a recently developed framework, SMASheD, that takes advantage of the Android’s ADB functionality and can programmatically inject noise to various inertial sensors. Although SMASheD was originally advertised as a malicious app by its authors, we use it to build a defense mechanism, called Slogger (“Smashing the logger”), for defeating sensor-based touchstroke logging attacks. Slogger transparently inserts noisy sensor readings in the background as the user provides sensitive touchscreen input (e.g., password, PIN or credit card info) in order to obfuscate the original sensor readings. It can be installed in the user space without the need to root the device and to change the device’s OS or kernel. The figure below shows the notion of noise injection to obfuscate the original signal.

Figure2: Notion of sensor event injection to obfuscate the original signal

Figure2: Notion of sensor event injection to obfuscate the original signal

People

Faculty

  • Nitesh Saxena

Student

  • Prakash Shrestha (PhD student)
  • Manar Mohamed (@UAB; PhD 2016; instructional faculty of Computer Science at the Temple University)

Publication

  • Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise.
    Prakash Shrestha, Manar Mohamed and Nitesh Saxena
    In ACM Conference on Wireless Network Security (WiSec), July 2016
    [pdf]

Media Coverage

  • Research finds novel defense against sophisticated smartphone keyloggers, UAB News, Sept 02, 2016
  • UAB researchers find way around malicious attacks on Android devices, Birmingham Business Journal, Sept 08, 2016
  • UAB researchers find way around malicious attacks on Android devices, Tuscaloosa News.Net, Sept 09, 2016
  • Research finds novel defense against sophisticated smartphone keyloggers , Wn.com, Sept 02, 2016
  • Research Finds Novel Defense Against Sophisticated Smartphone Keyloggers, Public., Sept 02, 2016
  • Research finds novel defense against sophisticated smartphone keyloggers, TechXplore, Sept 05, 2016

Recent News

  • Paper accepted to ACM CCS 2025 July 2, 2025
  • News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users June 30, 2025
  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025
  • AI Spies News — BPSniff (IEEE S&P 2025) Paper News Story May 12, 2025
  • Launching the AI Spies News Channel May 12, 2025
  • Paper accepted to WiSec 2025 May 11, 2025
  • SPIES Lab’s Secure Messaging Work Features in News May 3, 2025
  • SPIES Lab Student to Start as an Assistant Professor April 18, 2025
  • Dr. Saxena’s Primer on Secure Communications in News Media March 31, 2025
  • Dr. Saxena recognized with the Dean’s Excellence Award! February 14, 2025
  • Dr. Saxena appointed as the Senior Area Editor, IEEE TIFS February 6, 2025
  • 2 Full Papers Accepted to WWW 2025 January 20, 2025
  • Journal paper accepted to IEEE TMC December 18, 2024
  • New post-doctoral researcher joins the lab December 11, 2024
  • Paper Accepted to ACM Computing Surveys 2024 November 30, 2024

© 2016–2025 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment