Detecting Android Side Channel Probing Attacks Based on System States

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Side channels are actively exploited by attackers to infer users’ privacy from publicly-available information on Android devices, where attackers probe the states of system components (e.g., CPU and memory), APIs, and device sensors (e.g., gyroscope and microphone). These information can be accessed by applications without any additional permission. As a result, traditional permission-based solutions cannot efficiently prevent/detect these probing attacks. In this paper, we systematically analyze the Android side-channel probing attacks, and observe that the high frequency sensitive data collecting operations from a malicious app caused continuous changes of its process states. Based on this observation, we propose SideGuard, a process-state-based approach to detect side-channel probing attacks. It monitors the process states of the applications and creates the corresponding behavior models described by feature vectors. Based on the application behavior models, we train and obtain classifiers to detect malicious app behaviors by using learning-based classification techniques. We prototyped and evaluated our approach. The experiment results demonstrate the effectiveness of our approach.

Cite

CITATION STYLE

APA

Lin, Q., Mao, J., Shi, F., Zhu, S., & Liang, Z. (2019). Detecting Android Side Channel Probing Attacks Based on System States. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11604 LNCS, pp. 201–212). Springer Verlag. https://doi.org/10.1007/978-3-030-23597-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free