首页> 外文会议>IEEE International Conference on Network Protocols >Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones
【24h】

Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones

机译:玩游戏时隐私泄漏:智能手机上基于用户行为的新型隐蔽通道

获取原文

摘要

To protect user privacy, many smartphone systems, such as Android and Windows Phone, adopt the permission-based mechanism in which a user can evaluate the request of private information by a mobile app before installing it. However, recent studies show that the permission-based mechanism is vulnerable to application colluding attacks because two apps, which appear to be harmless individually, can establish a covert channel and use it to leak confidential information. In general, existing known covert channels usually work in a way that one app can modify the status of a system component, while the other can read the status. Even though several covert channel detection schemes have been proposed recently to fight against this type of covert channels, we point out that such designed covert channel detection schemes are not sufficient. In this paper, we demonstrate the possibility of establishing novel covert channels that work in quite different ways, in which one app (e.g., a game) can be designed deliberately such that the user will be induced to voluntarily modify the status of a system component (e.g., a motion sensor), while the other app can read the status of the system component. To validate our design, we implement three covert channels on Android. Our experiments show that these channels can bypass existing detection schemes. Moreover, we also measure the achievable throughput, error rate, and energy consumption in devices. The results demonstrate that our covert channels can achieve a transmission with high accuracy and low energy consumption. Our work sets a new alarm for the security issue of using smartphones.
机译:为了保护用户隐私,许多智能手机系统(例如Android和Windows Phone)都采用基于权限的机制,在这种机制中,用户可以在安装前评估移动应用程序对私人信息的请求。但是,最近的研究表明,基于权限的机制很容易受到应用程序合谋攻击,因为两个看上去单独无害的应用程序可以建立隐蔽渠道并使用它来泄漏机密信息。通常,现有已知的隐秘通道通常以一种应用程序可以修改系统组件的状态,而另一种可以读取状态的方式工作。尽管最近已经提出了几种隐蔽信道检测方案来对抗这种类型的隐蔽信道,但是我们指出,这种设计的隐蔽信道检测方案是不够的。在本文中,我们演示了建立以不同方式工作的新颖秘密渠道的可能性,在这种渠道中,可以故意设计一个应用程序(例如游戏),以便诱使用户自愿修改系统组件的状态。 (例如运动传感器),而另一个应用可以读取系统组件的状态。为了验证我们的设计,我们在Android上实现了三个秘密渠道。我们的实验表明,这些通道可以绕过现有的检测方案。此外,我们还测量了设备中可实现的吞吐量,错误率和能耗。结果表明,我们的隐蔽通道可以实现高精度和低能耗的传输。我们的工作为使用智能手机的安全性问题设置了新的警报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号