@article{10.1145/3078844, author = {Zhang, Ruide and Zhang, Ning and Du, Changlai and Lou, Wenjing and Hou, Y. Thomas and Kawamoto, Yuichi}, title = {From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality}, year = {2017}, issue_date = {January 2018}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {9}, number = {1}, issn = {2157-6904}, url = {[https://doi.org/10.1145/3078844](https://doi.org/10.1145/3078844)}, doi = {10.1145/3078844}, abstract = {With the increasing popularity of augmented reality (AR) services, providing seamless human-computer interactions in the AR setting has received notable attention in the industry. Gesture control devices have recently emerged to be the next great gadgets for AR due to their unique ability to enable computer interaction with day-to-day gestures. While these AR devices are bringing revolutions to our interaction with the cyber world, it is also important to consider potential privacy leakages from these always-on wearable devices. Specifically, the coarse access control on current AR systems could lead to possible abuse of sensor data.Although the always-on gesture sensors are frequently quoted as a privacy concern, there has not been any study on information leakage of these devices. In this article, we present our study on side-channel information leakage of the most popular gesture control device, Myo. Using signals recorded from the electromyography (EMG) sensor and accelerometers on Myo, we can recover sensitive information such as passwords typed on a keyboard and PIN sequence entered through a touchscreen. EMG signal records subtle electric currents of muscle contractions. We design novel algorithms based on dynamic cumulative sum and wavelet transform to determine the exact time of finger movements. Furthermore, we adopt the Hudgins feature set in a support vector machine to classify recorded signal segments into individual fingers or numbers. We also apply coordinate transformation techniques to recover fine-grained spatial information with low-fidelity outputs from the sensor in keystroke recovery.We evaluated the information leakage using data collected from a group of volunteers. Our results show that there is severe privacy leakage from these commodity wearable sensors. Our system recovers complex passwords constructed with lowercase letters, uppercase letters, numbers, and symbols with a mean success rate of 91%.}, journal = {ACM Trans. Intell. Syst. Technol.}, month = {sep}, articleno = {13}, numpages = {20}, keywords = {augmented reality, EMG side-channel, PIN sequence inference, keystroke detection, Information leakage} }