Detecting Android Side Channel Probing Attacks Based on System States

  • Qixiao Lin
  • , Jian Mao*
  • , Futian Shi
  • , Shishi Zhu
  • , Zhenkai Liang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Side channels are actively exploited by attackers to infer users’ privacy from publicly-available information on Android devices, where attackers probe the states of system components (e.g., CPU and memory), APIs, and device sensors (e.g., gyroscope and microphone). These information can be accessed by applications without any additional permission. As a result, traditional permission-based solutions cannot efficiently prevent/detect these probing attacks. In this paper, we systematically analyze the Android side-channel probing attacks, and observe that the high frequency sensitive data collecting operations from a malicious app caused continuous changes of its process states. Based on this observation, we propose SideGuard, a process-state-based approach to detect side-channel probing attacks. It monitors the process states of the applications and creates the corresponding behavior models described by feature vectors. Based on the application behavior models, we train and obtain classifiers to detect malicious app behaviors by using learning-based classification techniques. We prototyped and evaluated our approach. The experiment results demonstrate the effectiveness of our approach.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 14th International Conference, WASA 2019, Proceedings
EditorsEdoardo S. Biagioni, Yao Zheng, Siyao Cheng
PublisherSpringer Verlag
Pages201-212
Number of pages12
ISBN (Print)9783030235963
DOIs
StatePublished - 2019
Event14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019 - Honolulu, United States
Duration: 24 Jun 201926 Jun 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11604 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019
Country/TerritoryUnited States
CityHonolulu
Period24/06/1926/06/19

Keywords

  • Android system state
  • Application behavior model
  • Side-channel attack
  • Supervised learning

Fingerprint

Dive into the research topics of 'Detecting Android Side Channel Probing Attacks Based on System States'. Together they form a unique fingerprint.

Cite this