AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic

被引:234
作者
Taylor, Vincent F. [1 ]
Spolaor, Riccardo [2 ]
Conti, Mauro [2 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
[2] Univ Padua, Dept Math, Padua, Italy
来源
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY | 2016年
关键词
D O I
10.1109/EuroSP.2016.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Automatic fingerprinting and identification of smartphone apps is becoming a very attractive data gathering technique for adversaries, network administrators, investigators and marketing agencies. In fact, the list of apps installed on a device can be used to identify vulnerable apps for an attacker to exploit, uncover a victim's use of sensitive apps, assist network planning, and aid marketing. However, app fingerprinting is complicated by the vast number of apps available for download, the wide range of devices they may be installed on, and the use of payload encryption protocols such as HTTPS/TLS. In this paper, we present a novel methodology and a framework implementing it, called AppScanner, for the automatic fingerprinting and real-time identification of Android apps from their encrypted network traffic. To build app fingerprints, we run apps automatically on a physical device to collect their network traces. We apply various processing strategies to these network traces before extracting the features that are used to train our supervised learning algorithms. Our fingerprint generation methodology is highly scalable and does not rely on inspecting packet payloads; thus our framework works even when HTTPS/TLS is employed. We built and deployed this lightweight framework and ran a thorough set of experiments to assess its performance. We automatically profiled 110 of the most popular apps in the Google Play Store and were later able to re-identify them with more than 99% accuracy.
引用
收藏
页码:439 / 454
页数:16
相关论文
共 23 条
[1]  
[Anonymous], 2012, 2012 14 AS PAC NETW
[2]  
Bacic H., 2015, ARE YOU USING CONTEN
[3]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[4]  
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI [DOI 10.1145/2382196.2382260, 10.1145/2382196.2382260]
[5]   Analyzing Android Encrypted Network Traffic to Identify User Actions [J].
Conti, Mauro ;
Mancini, Luigi Vincenzo ;
Spolaor, Riccardo ;
Verde, Nino Vincenzo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :114-125
[6]  
Dai SF, 2013, IEEE INFOCOM SER, P809
[7]  
Falaki H., 2010, P 10 ANN C INTERNET, P281
[8]  
Flurry, 2015, SHOPP PROD MESS GIV
[9]  
Gartner, 2015, GARTN SAYS SMARTHPH
[10]  
Herrmann D., 2009, P 2009 ACM WORKSH CL, P31, DOI DOI 10.1145/1655008.1655013