Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








337 Hits in 5.0 sec

On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel

Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani
2017 IEEE Transactions on Information Forensics and Security  
Although there are studies that show that power-based sidechannels can predict browsing activity on laptops, our work is unique because it is the first to study this side-channel on smartphones, under  ...  On the other hand, our experiments also show that this side-channel is sensitive to some of the aforementioned conditions.  ...  Webpage Fingerprinting via Traffic Analysis Several side-channel attacks use network traffic analysis to infer user's web browsing activities. For example, Hintz et al.  ... 
doi:10.1109/tifs.2016.2639446 fatcat:x4o3cp5axnfypbfeyywksj43am

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard
2018 IEEE Communications Surveys and Tutorials  
While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged)  ...  Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices.  ...  [89] demonstrated that visited websites can be inferred by power traces collected via USB charging stations.  ... 
doi:10.1109/comst.2017.2779824 fatcat:4r5ceyc7pbdfxdmngtdncv4n5m

Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage

Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang
2021 USENIX Security Symposium  
We reveal that while a smartphone is charging, its power trace, which can be measured via the USB charging cable, leaks information about the dynamic content on its screen.  ...  We develop a portable, low cost power trace collection system for the side-channel construction.  ...  channel through the USB power line to infer user interactions with the content on the touchscreen.  ... 
dblp:conf/uss/Cronin0YW21 fatcat:6dbom7k4b5c6tcv54oums56ptu

Wireless Charging Power Side-Channel Attacks [article]

Alexander S. La Cour, Khurram K. Afridi, G. Edward Suh
2021 arXiv   pre-print
Additionally, this study compares the wireless charging side-channel with the wired USB charging power side-channel, showing that they are comparable.  ...  This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone charging wirelessly leaks private information about its activity to the wireless charger  ...  Simple power analysis is a method of power side-channel attack that infers a secret value from a power trace by identifying power consumption profiles that directly depend on the secret.  ... 
arXiv:2105.12266v2 fatcat:z7r2mc2ztrb77golh3il3urgti

EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones [article]

Quancheng Wang, Ming Tang, Jianming Fu
2023 arXiv   pre-print
Based on this observation, we present EavesDroid, an application-embedded side-channel attack on Android smartphones that allows unprivileged attackers to accurately identify fine-grained user behaviors  ...  (e.g., viewing messages and playing videos) via on-screen operations.  ...  To the best of our knowledge, our work is the first that allows inferring the fine-grained user behaviors via OS side-channel attacks on smartphones.  ... 
arXiv:2303.03700v2 fatcat:7xucdfcodrbt3e5rb55l7urfde

Anatomizing application performance differences on smartphones

Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley Mao, Ming Zhang, Paramvir Bahl
2010 Proceedings of the 8th international conference on Mobile systems, applications, and services - MobiSys '10  
We identify and study important factors that impact userperceived performance of network applications on smartphones.  ...  Our analysis culminates with a set of recommendations that can lead to better application design and infrastructure support for smartphone users.  ...  Web browsing via 3G networks There are two sets of data in Figure 7 . One set is collected when each smartphone visits the real URLs via 3G networks.  ... 
doi:10.1145/1814433.1814452 dblp:conf/mobisys/HuangXTMZB10 fatcat:h6l5a547zbclzly7vbdrc73wna

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Zia Muhammad, Zahid Anwar, Abdul Rehman Javed, Bilal Saleem, Sidra Abbas, Thippa Reddy Gadekallu
2023 Technologies  
Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store.  ...  These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage.  ...  Power Analysis Attacks Power analysis attacks are side-channel attacks that exploit the power consumption of a device to infer sensitive information, such as encryption keys, passwords, or user activities  ... 
doi:10.3390/technologies11030076 fatcat:hvombg4zanbvnmejxw6bknke34

Characterizing radio resource allocation for 3G networks

Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck
2010 Proceedings of the 10th annual conference on Internet measurement - IMC '10  
Our analysis also demonstrates that traffic patterns impose significant impact on radio resource and energy consumption.  ...  In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies.  ...  The battery of an HTC TyTN II smartphone is attached to a hardware power meter [4] , which is also connected via USB to a PC that records fine-grained power measurements by sampling the current drawn  ... 
doi:10.1145/1879141.1879159 dblp:conf/imc/QianWGMSS10 fatcat:hqgwm3z2jjfkfmieyqyv6zszyq

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels [article]

Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer
2018 arXiv   pre-print
., on Google Hangout) to infer whether the other side is browsing the web in lieu of watching the video call, and which web site is displayed on their screen.  ...  Empirically demonstrating various attack scenarios, we show how this channel can be used for real-time detection of on-screen text, or users' input into on-screen virtual keyboards.  ...  Related work Physical side channels. Numerous prior works have demonstrated physical side channels, as discussed above.  ... 
arXiv:1809.02629v1 fatcat:ppetoi3gqzaynasuo6ekiunsay

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Charlie Jacomme, Steve Kremer
2018 2018 IEEE 31st Computer Security Foundations Symposium (CSF)  
This may be due to the order of reception of requests, and session expiration on the server side.  ...  However this new version has yet to be implemented on some of the smartphones we used for tests.  ...  Moreover, the code is sent through a TLS channel rather than via SMS, which may arguably provide better security.  ... 
doi:10.1109/csf.2018.00008 dblp:conf/csfw/JacommeK18 fatcat:rh2i7kqh4jbtdaqdw2zzuwmize

Your WiFi is leaking: What do your mobile apps gossip about you?

John S. Atkinson, John E. Mitchell, Miguel Rio, George Matich
2018 Future generations computer systems  
Side-channels & private information inference Side-channel analysis is famed for its use in breaking encryption but remains ''an often-overlooked threat'' [20] .  ...  only side-channels.  ... 
doi:10.1016/j.future.2016.05.030 fatcat:5ik3yfqe7vaknen4xsyoh4lihu

A close examination of performance and power characteristics of 4G LTE networks

Junxian Huang, Feng Qian, Alexandre Gerber, Z. Morley Mao, Subhabrata Sen, Oliver Spatscheck
2012 Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12  
Instead, the device's processing power, despite the significant improvement compared to our analysis two years ago, becomes more of a bottleneck.  ...  Despite several new power saving improvements, we find that LTE is as much as 23 times less power efficient compared with WiFi, and even less power efficient than 3G, based on the user traces and the long  ...  We observe that ∆(S) and ∆(D) curves are almost identical, since most channel scheduling delay results from idle to active promotions.  ... 
doi:10.1145/2307636.2307658 dblp:conf/mobisys/HuangQGMSS12 fatcat:oytnvaphnfhnrmrlz3ipmkfaki

L4Android

Matthias Lange, Steffen Liebergeld, Adam Lackorzynski, Alexander Warg, Michael Peter
2011 Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11  
We encapsulate the original smartphone operating system in a virtual machine. Our framework allows for highly secure applications to run side-by-side with the virtual machine.  ...  It is based on a state-of-the-art microkernel that ensures isolation between the virtual machine and secure applications.  ...  Such a channel has a sender and a receiver side. A receiver binds to such a channel to be targeted as the recipient of a message by the kernel.  ... 
doi:10.1145/2046614.2046623 dblp:conf/ccs/LangeLLWP11 fatcat:ybnqzm4vojf2xil227deqwqlky

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Charlie Jacomme, Steve Kremer
2021 ACM Transactions on Privacy and Security  
are performed over TLS channels, that computers may be infected by different kinds of malware, that attackers could perform phishing, and that humans may omit some actions.  ...  Our analysis highlights weaknesses and strengths of the different protocols.  ...  Moreover, the code is sent through a TLS channel rather than via SMS, which may arguably provide better security.  ... 
doi:10.1145/3440712 fatcat:z2nbvtrkyfap5pubtdssuut4zi

A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors

Agata Kołakowska, Wioleta Szwoch, Mariusz Szwoch
2020 Sensors  
This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels.  ...  The characteristics of the most important sensors in this respect are presented, and the methods applied to extract informative features on the basis of data read from these input channels.  ...  The aim of the research was to identify papers focusing on the recognition of emotions or mood on the basis of data recorded via smartphone sensors.  ... 
doi:10.3390/s20216367 pmid:33171646 pmcid:PMC7664622 fatcat:xxtf6f3xqjfcxmzhp6g74475iy
« Previous Showing results 1 — 15 out of 337 results