Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

04/30/2019
by   Kavita Kumari, et al.
0

Abuse of zero-permission sensors on-board mobile and wearable devices to infer users' personal context and information is a well-known privacy threat that has received significant attention. Efforts towards protection mechanisms that prevent or limit the success of such threats, however, have been ad-hoc so far and have primarily focused on designing threat-specific customized defense mechanisms. Such approaches are not very practical, as evident from their limited adoption within major mobile/wearable operating systems. In the end, it is clear that all privacy threats that take advantage of unrestricted access to zero-permission sensors can be prevented if access to these sensors is regulated. However, due to the dynamic nature of sensor usage and requirements of different mobile applications, design of such access control mechanisms is not trivial. To effectively design an automated mobile defense mechanism that can dynamically measure the threat level of different sensor access requests from different applications and appropriately block suspicious requests, the problem of zero-permission sensor access needs to be first formally defined and analyzed. This paper accomplishes the above objective by employing game theory, specifically, signaling games, to analytically model the sensor access scenario for mobile applications, including, formalizing sensor access strategies of mobile applications and defense strategies of the on-board defense mechanism and the associated costs and benefits. Within the confines of a formal and practical game model, the paper then outlines conditions under which equilibria can be achieved between entities (applications and defense mechanism) with conflicting goals. The game model is further analyzed using numerical simulations, and also extended in the form of a repeated signaling game.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2019

Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach

With the increasing diversity of Distributed Denial-of-Service (DDoS) at...
research
03/03/2019

Game Theory for Cyber Deception: A Tutorial

Deceptive and anti-deceptive technologies have been developed for variou...
research
02/26/2021

Cybersecurity Threats in Connected and Automated Vehicles based Federated Learning Systems

Federated learning (FL) is a machine learning technique that aims at tra...
research
01/30/2019

Robust Sensor Design Against Multiple Attackers with Misaligned Control Objectives

We introduce a robust sensor design framework to provide defense against...
research
08/20/2022

Sensor Security: Current Progress, Research Challenges, and Future Roadmap

Sensors are one of the most pervasive and integral components of today's...
research
06/04/2023

Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services

Generative AI (GAI) models have been rapidly advancing, with a wide rang...
research
05/25/2020

Optimal assignment of collaborating agents in multi-body asset-guarding games

We study a multi-body asset-guarding game in missile defense where teams...

Please sign up or login with your details

Forgot password? Click here to reset