Sensor side-channel attacks on user privacy: analysis and mitigation.

Mobile smartphones are equipped with an increasingly large number of precise and sophisticated sensors. These sensors vastly enhance the user's GUI experience, but they also raise the risk of directly or indirectly leaking their private information. Mobile operating systems (e.g., Android and i...

Full description

Bibliographic Details
Published:
Online Access:http://hdl.handle.net/2047/D20272933
id ndltd-NEU--neu-cj82r527t
record_format oai_dc
spelling ndltd-NEU--neu-cj82r527t2021-04-13T05:13:56ZSensor side-channel attacks on user privacy: analysis and mitigation.Mobile smartphones are equipped with an increasingly large number of precise and sophisticated sensors. These sensors vastly enhance the user's GUI experience, but they also raise the risk of directly or indirectly leaking their private information. Mobile operating systems (e.g., Android and iOS) mitigate such leakages by implementing app-level sandboxing and resource permissions. These protections may suffice for traditional privacy attacks using traditional hardware, however, they fail when attacks exploit side-channels that bypass the protections. One example of such side-channels is the motion sensors (Accelerometer, Gyroscope and Magnetometer) embedded in most modern smartphones. In this dissertation, we demonstrate two attacks that exploit the motion sensors on smartphones to infer accurate private information about the users such as their typed passwords and significant locations. To protect users from the above attacks and other location / sensor side-channel attacks, we propose the design and implementation of a mitigation framework called MATRIX for the Android ecosystem.http://hdl.handle.net/2047/D20272933
collection NDLTD
sources NDLTD
description Mobile smartphones are equipped with an increasingly large number of precise and sophisticated sensors. These sensors vastly enhance the user's GUI experience, but they also raise the risk of directly or indirectly leaking their private information. Mobile operating systems (e.g., Android and iOS) mitigate such leakages by implementing app-level sandboxing and resource permissions. These protections may suffice for traditional privacy attacks using traditional hardware, however, they fail when attacks exploit side-channels that bypass the protections. One example of such side-channels is the motion sensors (Accelerometer, Gyroscope and Magnetometer) embedded in most modern smartphones. In this dissertation, we demonstrate two attacks that exploit the motion sensors on smartphones to infer accurate private information about the users such as their typed passwords and significant locations. To protect users from the above attacks and other location / sensor side-channel attacks, we propose the design and implementation of a mitigation framework called MATRIX for the Android ecosystem.
title Sensor side-channel attacks on user privacy: analysis and mitigation.
spellingShingle Sensor side-channel attacks on user privacy: analysis and mitigation.
title_short Sensor side-channel attacks on user privacy: analysis and mitigation.
title_full Sensor side-channel attacks on user privacy: analysis and mitigation.
title_fullStr Sensor side-channel attacks on user privacy: analysis and mitigation.
title_full_unstemmed Sensor side-channel attacks on user privacy: analysis and mitigation.
title_sort sensor side-channel attacks on user privacy: analysis and mitigation.
publishDate
url http://hdl.handle.net/2047/D20272933
_version_ 1719395691570135040