Peel the onion: Recognition of Android apps behind the Tor Network

01/14/2019
by   Emanuele Petagna, et al.
0

In this work we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor, which is the victim of the attack. Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how the attack can be performed in practice and allows to assess the deanonymization accuracy that it is possible to achieve. While attacks against Tor anonymity have been already gained considerable attention in the context of website fingerprinting in desktop environments, to the best of our knowledge this is the first work that highlights Tor vulnerability to apps deanonymization attacks on Android devices. In our experiments we achieved an accuracy of 97

READ FULL TEXT

page 14

page 15

research
04/12/2018

Analysing Use of High Privileges in Android Applications

The number of Android smartphone and tablet users has experienced a rapi...
research
01/13/2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

Cross-app collaboration via inter-component communication is a fundament...
research
05/24/2021

Dissecting Click Fraud Autonomy in the Wild

Although the use of pay-per-click mechanisms stimulates the prosperity o...
research
07/14/2022

Behavioral Model For Live Detection of Apps Based Attack

Smartphones with the platforms of applications are gaining extensive att...
research
02/02/2021

PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos

Pattern lock is a general technique used to realize identity authenticat...
research
03/06/2021

Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps

A fundamental premise of SMS One-Time Password (OTP) is that the used ps...
research
05/26/2021

Wireless Charging Power Side-Channel Attacks

This paper shows that today's wireless charging interface is vulnerable ...

Please sign up or login with your details

Forgot password? Click here to reset