MagAttack: Guessing Application Launching and Operation via Smartphone

被引:20
作者
Cheng, Yushi [1 ,2 ]
Ji, Xiaoyu [1 ,2 ]
Xu, Wenyuan [1 ]
Pan, Hao [3 ]
Zhu, Zhuangdi [4 ]
You, Chuang-Wen [5 ]
Chen, Yi-Chao [6 ]
Qiu, Lili [6 ]
机构
[1] Zhejiang Univ, Hangzhou, Peoples R China
[2] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou, Peoples R China
[3] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[4] Michigan State Univ, E Lansing, MI 48824 USA
[5] Natl Taiwan Univ, Taipei, Taiwan
[6] Univ Texas Austin, Austin, TX 78712 USA
来源
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) | 2019年
关键词
Side Channel Attack; Electromagnetic Emission; User Privacy; Commodity Mobile Device;
D O I
10.1145/3321705.3329817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have emerged as the most popular platforms to access information. However, they have also become a major concern of privacy violation and previous researches have demonstrated various approaches to infer user privacy based on mobile devices. In this paper, we study a new side channel of a laptop that could be harvested by a commercial-off-the-shelf (COTS) mobile device, e.g., a smartphone. We propose MagAttack, which exploits the electromagnetic (EM) side channel of a laptop to infer user activities, i.e., application launching and application operation. The key insight of MagAttack is that applications are discrepant in essence due to the different compositions of instructions, which can be reflected on the CPU power consumption, and thus the corresponding EM emissions. MagAttack is challenging since that EM signals are noisy due to the dynamics of applications and the limited sampling rate of the built-in magnetometers in COTS mobile devices. We overcome these challenges and convert noisy coarse-grained EM signals to robust fine-grained features. We implement MagAttack on both an iOS and an Android smartphone without any hardware modification, and evaluate its performance with 13 popular applications and 50 top websites in China. The results demonstrate that MagAttack can recognize aforementioned 13 applications with an average accuracy of 98.6%, and figure out the visiting operation among 50 websites with an average accuracy of 84.7%.
引用
收藏
页码:283 / 294
页数:12
相关论文
共 31 条
[1]  
Akansu A.N., 2001, Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets, V2nd ed.
[2]  
Alexa, 2017, TOP SITE CHIN
[3]  
Aviv AJ, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P41
[4]   Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors [J].
Biedermann, Sebastian ;
Katzenbeisser, Stefan ;
Szefer, Jakub .
Financial Cryptography and Data Security (FC 2015), 2015, 8975 :489-496
[5]  
Cai L., 2011, P 6 USENIX C HOT TOP
[6]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[7]  
Chen KY, 2015, INT CONF PERVAS COMP, P46, DOI 10.1109/PERCOM.2015.7146508
[8]  
Clark S, 2013, CAN CON EL COMP EN, P707
[9]   ENTROPY-BASED ALGORITHMS FOR BEST BASIS SELECTION [J].
COIFMAN, RR ;
WICKERHAUSER, MV .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (02) :713-718
[10]  
dtrace.org, 2017, DTRAC