Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices

10/12/2021
by   Carlton Shepherd, et al.
0

Mobile devices often distribute measurements from a single physical sensor to multiple applications using software-based multiplexing. On Android devices, the highest requested sampling frequency is returned to all applications even if other applications request measurements at lower frequencies. In this paper, we demonstrate that this design choice exposes practically exploitable side-channels based on frequency-key shifting. By carefully modulating sensor sampling frequencies in software, we show that unprivileged malicious applications can construct reliable spectral covert channels that bypass existing security mechanisms, e.g. Android's permissions framework. Moreover, we present a variant of this technique that allows an unprivileged malicious observer app to fingerprint other device applications and user interactions at a coarse-grained level. Both techniques do not impose any assumptions beyond application installation and accessing standard mobile services via the Android Sensors SDK. As such, they open a powerful attack vector that exploits subtle yet insecure design choices in mobile sensor stacks.

READ FULL TEXT

page 9

page 11

page 12

page 13

research
12/21/2019

The Mobile AR Sensor Logger for Android and iOS Devices

In recent years, commodity mobile devices equipped with cameras and iner...
research
12/13/2021

Software Micro-Rejuvenation for Android Mobile Systems

Software aging – the phenomenon affecting many long-running systems, cau...
research
01/23/2020

SeCloak: ARM Trustzone-based Mobile Peripheral Control

Reliable on-off control of peripherals on smart devices is a key to secu...
research
08/11/2018

Attacks Against BLE Devices by Co-located Mobile Applications

Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a ...
research
02/08/2020

On the Insecurities of Mobile D2D File Sharing Applications

With more than 1.3 Billion in the cumulative number of downloads reporte...
research
11/15/2017

Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services

Widespread growth in Android malwares stimulates security researchers to...
research
05/24/2019

Scan-and-Pay on Android is Dangerous

Mobile payments have increased significantly in the recent years and one...

Please sign up or login with your details

Forgot password? Click here to reset