Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

07/07/2018
by   Mikhail Andreev, et al.
0

We evaluate the power of simple networks side-channels to violate user privacy on Android devices. Specifically, we show that, using blackbox network metadata alone (i.e., traffic statistics such as transmission time and size of packets) it is possible to infer several elements of a user's location and also identify their web browsing history (i.e, which sites they visited). We do this with relatively simple learning and classification methods and basic network statistics. For most Android phones currently on the market, such process-level traffic statistics are available for any running process, without any permissions control and at fine-grained details, although, as we demonstrate, even device-level statistics are sufficient for some of our attacks. In effect, it may be possible for any application running on these phones to identify privacy-revealing elements of a user's location, for example, correlating travel with places of worship, point-of-care medical establishments, or political activity.

READ FULL TEXT
research
12/12/2018

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices

In recent years we have witnessed a shift towards personalized, context-...
research
08/15/2022

The effectiveness of using Google Maps Location History data to detect joint activities in social networks

This study evaluates the effectiveness of using Google Maps Location His...
research
02/03/2023

Android OS Privacy Under the Loupe – A Tale from the East

China is currently the country with the largest number of Android smartp...
research
08/11/2018

Attacks Against BLE Devices by Co-located Mobile Applications

Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a ...
research
03/07/2023

EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones

As the Internet of Things (IoT) continues to evolve, smartphones have be...
research
02/24/2021

Analyzing Confidentiality and Privacy Concerns: Insights from Android Issue Logs

Context: Post-release user feedback plays an integral role in improving ...
research
04/03/2019

Using Google Analytics to Support Cybersecurity Forensics

Web traffic is a valuable data source, typically used in the marketing s...

Please sign up or login with your details

Forgot password? Click here to reset