Inferences from Interactions with Smart Devices: Security Leaks and Defenses