Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings

06/13/2023
by   Evangelos Bitsikas, et al.
0

Short Message Service (SMS) remains one of the most popular communication channels since its introduction in 2G cellular networks. In this paper, we demonstrate that merely receiving silent SMS messages regularly opens a stealthy side-channel that allows other regular network users to infer the whereabouts of the SMS recipient. The core idea is that receiving an SMS inevitably generates Delivery Reports whose reception bestows a timing attack vector at the sender. We conducted experiments across various countries, operators, and devices to show that an attacker can deduce the location of an SMS recipient by analyzing timing measurements from typical receiver locations. Our results show that, after training an ML model, the SMS sender can accurately determine multiple locations of the recipient. For example, our model achieves up to 96 86 designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.

READ FULL TEXT

page 8

page 21

research
10/19/2022

Hope of Delivery: Extracting User Locations From Mobile Instant Messengers

Mobile instant messengers such as WhatsApp use delivery status notificat...
research
04/05/2018

Timing Channel in IaaS: How to Identify and Investigate

Recently, the IaaS (Infrastructure as a Service) Cloud (e.g., Amazon EC2...
research
06/09/2021

LTrack: Stealthy Tracking of Mobile Phones in LTE

We introduce LTrack, a new tracking attack on LTE that allows an attacke...
research
12/31/2018

Stealing Neural Networks via Timing Side Channels

Deep learning is gaining importance in many applications and Cloud infra...
research
11/30/2020

Media Content Delivery Protocols Performance and Reliability Evaluation in Cellular Mobile Networks

Currently, tens of millions of devices around the world communicate with...
research
07/23/2019

Efficient Detection and Quantification of Timing Leaks with Neural Networks

Detection and quantification of information leaks through timing side ch...
research
05/25/2021

VerLoc: Verifiable Localization in Decentralized Systems

This paper tackles the challenge of reliably determining the geo-locatio...

Please sign up or login with your details

Forgot password? Click here to reset