Cybersecurity“Knock Codes” for Smartphone Security Are Easily Predicted

Published 30 July 2020

  Smartphone owners who unlock their devices with knock codes aren’t as safe as they think, according to new research. Knock codes work by letting people select patterns to tap on a phone’s locked screen. LG popularized the method in 2014, and now there are approximately 700,000 people using this method in the U.S. alone, along with one million downloads worldwide of clone applications for Google Android devices generally.

Smartphone owners who unlock their devices with knock codes aren’t as safe as they think, according to researchers from NJIT, the George Washington University(GW) and Ruhr University Bochum in Germany.

Knock codes work by letting people select patterns to tap on a phone’s locked screen. LG popularized the method in 2014, and now there are approximately 700,000 people using this method in the U.S. alone, along with one million downloads worldwide of clone applications for Google Android devices generally, the researchers said.

Raina Samuel, a doctoral student in computer science at NJIT’s Ying Wu College of Computing, said she had the idea for this research while attending a security conference in 2017.

During that conference I heard our co-author Adam Aviv. He was talking about passwords, PINs, shoulder surfing and how these mobile methods of authentication can be manipulated and insecure sometimes,” she explained. “At the time I had an LG phone and I was using the knock codes. It was a bit of a personal interest for me. During the break I asked him [for] his personal opinion.”

Knock codes really intrigued me as I have spent a lot of time working on other mobile authentication options, such as PINs or Android patterns, and had never heard of these,” Aviv said. “Turns out, while less popular than PINs or patterns, there are still a surprising number of people using knock codes, so it was important to understand the security and usability properties of them.”

Aviv, a professor at GW, later asked Ruhr University’s Philipp Markert to join their project when peer reviewers said the study of knock code patterns should be done on phones, not on computer simulations. Markert adapted the study’s programming for this change.

Markert also contributed to the data analysis and created tables for their revised paper, which will be presented at the 16th Symposium on Usable Privacy and Security, held concurrently with the prestigious USENIX Security Symposium August 9-11.

“When Adam asked me to join the team, I didn’t think twice. I’ve worked with him on a similar project about PINs before, plus, I’m always interested in new authentication schemes,” Markert said.

Knock codes typically present users with a 2-by-2 grid which must be tapped in the correct sequence to unlock their phone. The sequence is between six and ten taps. The researchers analysed how easily an attacker could guess a tapping pattern.

In an online study, 351 participants picked codes. The researchers found that 65% of users started their codes in the top left corner, often proceeding to the top right corner next, which could be attributed to Western reading habits. They also found that increasing the size of the grid didn’t help, instead making the users more likely to pick shorter codes.

Researchers also tested a blocklist of common codes, so that survey participants would pick something harder to guess. The list contained the 30 most popular codes. The first three were: top left, top right, bottom left, bottom right, top left, top right; top left, top right, bottom right, bottom left, top left, top right; and top left, top left, top right, top right, bottom left, bottom left.

The study also showed that knock codes are difficult to memorize. Approximately one in ten participants forgot their code by the end of the study, even though it lasted only five minutes. In addition, entering such a code to unlock the display took 5 seconds on average, compared to entering a PIN which typically takes 4.5 seconds and an Android unlock pattern needing only 3 seconds.

Funding was supplied by the Army Research Laboratory, National Science Foundation and Germany’s North Rhine-Westphalian Experts on Research in Digitalization.

Samuel said there should be a feature that blocks codes which are too easy to guess and advises users to pick stronger ones, similar to how some websites respond when users create password-protected accounts. LG did not respond when asked to comment.