A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel
2017
IEEE Transactions on Information Forensics and Security
Although there are studies that show that power-based sidechannels can predict browsing activity on laptops, our work is unique because it is the first to study this side-channel on smartphones, under ...
On the other hand, our experiments also show that this side-channel is sensitive to some of the aforementioned conditions. ...
Webpage Fingerprinting via Traffic Analysis Several side-channel attacks use network traffic analysis to infer user's web browsing activities. For example, Hintz et al. ...
doi:10.1109/tifs.2016.2639446
fatcat:x4o3cp5axnfypbfeyywksj43am
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
2018
IEEE Communications Surveys and Tutorials
While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) ...
Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices. ...
[89] demonstrated that visited websites can be inferred by power traces collected via USB charging stations. ...
doi:10.1109/comst.2017.2779824
fatcat:4r5ceyc7pbdfxdmngtdncv4n5m
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage
2021
USENIX Security Symposium
We reveal that while a smartphone is charging, its power trace, which can be measured via the USB charging cable, leaks information about the dynamic content on its screen. ...
We develop a portable, low cost power trace collection system for the side-channel construction. ...
channel through the USB power line to infer user interactions with the content on the touchscreen. ...
dblp:conf/uss/Cronin0YW21
fatcat:6dbom7k4b5c6tcv54oums56ptu
Wireless Charging Power Side-Channel Attacks
[article]
2021
arXiv
pre-print
Additionally, this study compares the wireless charging side-channel with the wired USB charging power side-channel, showing that they are comparable. ...
This paper shows that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone charging wirelessly leaks private information about its activity to the wireless charger ...
Simple power analysis is a method of power side-channel attack that infers a secret value from a power trace by identifying power consumption profiles that directly depend on the secret. ...
arXiv:2105.12266v2
fatcat:z7r2mc2ztrb77golh3il3urgti
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones
[article]
2023
arXiv
pre-print
Based on this observation, we present EavesDroid, an application-embedded side-channel attack on Android smartphones that allows unprivileged attackers to accurately identify fine-grained user behaviors ...
(e.g., viewing messages and playing videos) via on-screen operations. ...
To the best of our knowledge, our work is the first that allows inferring the fine-grained user behaviors via OS side-channel attacks on smartphones. ...
arXiv:2303.03700v2
fatcat:7xucdfcodrbt3e5rb55l7urfde
Anatomizing application performance differences on smartphones
2010
Proceedings of the 8th international conference on Mobile systems, applications, and services - MobiSys '10
We identify and study important factors that impact userperceived performance of network applications on smartphones. ...
Our analysis culminates with a set of recommendations that can lead to better application design and infrastructure support for smartphone users. ...
Web browsing via 3G networks There are two sets of data in Figure 7 . One set is collected when each smartphone visits the real URLs via 3G networks. ...
doi:10.1145/1814433.1814452
dblp:conf/mobisys/HuangXTMZB10
fatcat:h6l5a547zbclzly7vbdrc73wna
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
2023
Technologies
Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store. ...
These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. ...
Power Analysis Attacks Power analysis attacks are side-channel attacks that exploit the power consumption of a device to infer sensitive information, such as encryption keys, passwords, or user activities ...
doi:10.3390/technologies11030076
fatcat:hvombg4zanbvnmejxw6bknke34
Characterizing radio resource allocation for 3G networks
2010
Proceedings of the 10th annual conference on Internet measurement - IMC '10
Our analysis also demonstrates that traffic patterns impose significant impact on radio resource and energy consumption. ...
In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. ...
The battery of an HTC TyTN II smartphone is attached to a hardware power meter [4] , which is also connected via USB to a PC that records fine-grained power measurements by sampling the current drawn ...
doi:10.1145/1879141.1879159
dblp:conf/imc/QianWGMSS10
fatcat:hqgwm3z2jjfkfmieyqyv6zszyq
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
[article]
2018
arXiv
pre-print
., on Google Hangout) to infer whether the other side is browsing the web in lieu of watching the video call, and which web site is displayed on their screen. ...
Empirically demonstrating various attack scenarios, we show how this channel can be used for real-time detection of on-screen text, or users' input into on-screen virtual keyboards. ...
Related work Physical side channels. Numerous prior works have demonstrated physical side channels, as discussed above. ...
arXiv:1809.02629v1
fatcat:ppetoi3gqzaynasuo6ekiunsay
An Extensive Formal Analysis of Multi-factor Authentication Protocols
2018
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
This may be due to the order of reception of requests, and session expiration on the server side. ...
However this new version has yet to be implemented on some of the smartphones we used for tests. ...
Moreover, the code is sent through a TLS channel rather than via SMS, which may arguably provide better security. ...
doi:10.1109/csf.2018.00008
dblp:conf/csfw/JacommeK18
fatcat:rh2i7kqh4jbtdaqdw2zzuwmize
Your WiFi is leaking: What do your mobile apps gossip about you?
2018
Future generations computer systems
Side-channels & private information inference Side-channel analysis is famed for its use in breaking encryption but remains ''an often-overlooked threat'' [20] . ...
only side-channels. ...
doi:10.1016/j.future.2016.05.030
fatcat:5ik3yfqe7vaknen4xsyoh4lihu
A close examination of performance and power characteristics of 4G LTE networks
2012
Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12
Instead, the device's processing power, despite the significant improvement compared to our analysis two years ago, becomes more of a bottleneck. ...
Despite several new power saving improvements, we find that LTE is as much as 23 times less power efficient compared with WiFi, and even less power efficient than 3G, based on the user traces and the long ...
We observe that ∆(S) and ∆(D) curves are almost identical, since most channel scheduling delay results from idle to active promotions. ...
doi:10.1145/2307636.2307658
dblp:conf/mobisys/HuangQGMSS12
fatcat:oytnvaphnfhnrmrlz3ipmkfaki
L4Android
2011
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11
We encapsulate the original smartphone operating system in a virtual machine. Our framework allows for highly secure applications to run side-by-side with the virtual machine. ...
It is based on a state-of-the-art microkernel that ensures isolation between the virtual machine and secure applications. ...
Such a channel has a sender and a receiver side. A receiver binds to such a channel to be targeted as the recipient of a message by the kernel. ...
doi:10.1145/2046614.2046623
dblp:conf/ccs/LangeLLWP11
fatcat:ybnqzm4vojf2xil227deqwqlky
An Extensive Formal Analysis of Multi-factor Authentication Protocols
2021
ACM Transactions on Privacy and Security
are performed over TLS channels, that computers may be infected by different kinds of malware, that attackers could perform phishing, and that humans may omit some actions. ...
Our analysis highlights weaknesses and strengths of the different protocols. ...
Moreover, the code is sent through a TLS channel rather than via SMS, which may arguably provide better security. ...
doi:10.1145/3440712
fatcat:z2nbvtrkyfap5pubtdssuut4zi
A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors
2020
Sensors
This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels. ...
The characteristics of the most important sensors in this respect are presented, and the methods applied to extract informative features on the basis of data read from these input channels. ...
The aim of the research was to identify papers focusing on the recognition of emotions or mood on the basis of data recorded via smartphone sensors. ...
doi:10.3390/s20216367
pmid:33171646
pmcid:PMC7664622
fatcat:xxtf6f3xqjfcxmzhp6g74475iy
« Previous
Showing results 1 — 15 out of 337 results