EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones

03/07/2023
by   Quancheng Wang, et al.
0

As the Internet of Things (IoT) continues to evolve, smartphones have become essential components of IoT systems. However, with the increasing amount of personal information stored on smartphones, user privacy is at risk of being compromised by malicious attackers. Although malware detection engines are commonly installed on smartphones against these attacks, attacks that can evade these defenses may still emerge. In this paper, we analyze the return values of system calls on Android smartphones and find two never-disclosed vulnerable return values that can leak fine-grained user behaviors. Based on this observation, we present EavesDroid, an application-embedded side-channel attack on Android smartphones that allows unprivileged attackers to accurately identify fine-grained user behaviors (e.g., viewing messages and playing videos) via on-screen operations. Our attack relies on the correlation between user behaviors and the return values associated with hardware and system resources. While this attack is challenging since these return values are susceptible to fluctuation and misalignment caused by many factors, we show that attackers can eavesdrop on fine-grained user behaviors using a CNN-GRU classification model that adopts min-max normalization and multiple return value fusion. Our experiments on different models and versions of Android smartphones demonstrate that EavesDroid can achieve 98 accuracy for 17 classes of user behaviors in the test set and real-world settings, highlighting the risk of our attack on user privacy. Finally, we recommend effective malware detection, carefully designed obfuscation methods, or restrictions on reading vulnerable return values to mitigate this attack.

READ FULL TEXT

page 1

page 8

page 9

page 10

page 11

page 13

research
02/12/2021

A Non-Intrusive Machine Learning Solution for Malware Detection and Data Theft Classification in Smartphones

Smartphones contain information that is more sensitive and personal than...
research
05/16/2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones

Intelligent Personal Assistant (IA), also known as Voice Assistant (VA),...
research
11/20/2022

Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization

The vulnerability of smartphones to cyberattacks has been a severe conce...
research
07/08/2020

Fine-grained Vibration Based Sensing Using a Smartphone

Recognizing surfaces based on their vibration signatures is useful as it...
research
10/23/2018

Adversarial WiFi Sensing

Wireless devices are everywhere, at home, at the office, and on the stre...
research
09/23/2021

Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem

In cybersecurity, attackers range from brash, unsophisticated script kid...
research
07/07/2018

Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

We evaluate the power of simple networks side-channels to violate user p...

Please sign up or login with your details

Forgot password? Click here to reset