首页> 外文期刊>Computers & Security >JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones
【24h】

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

机译:JFCGuard:通过智能手机上的处理器使用情况分析检测果汁拍摄收费攻击

获取原文
获取原文并翻译 | 示例

摘要

Smartphones have become necessities in people's lives, so that many more public charging stations are under deployment worldwide to meet the increasing demand of phone charging (i.e., in airports, subways, shops, etc.). However, this situation may expose a hole for cyber-criminals to launch various attacks especially charging attacks and threaten users' privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone screen and monitoring users' inputs during the whole charging period. More importantly, this attack does not need any permission or installing any pieces of apps on users' side. The rationale is that users' information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of JFC attack, in this work, we investigate the impact of JFC attack on processor usage including both CPU and GPU usage. It is found that JFC attack would cause a noticeable usage increase when connecting the phone to the JFC charger. Then, we design a security mechanism, called JFCGuard, to detect JFC attack based on processor usage analysis for smartphone users. In the evaluation, we perform a user study with over 250 participants and the results demonstrate that JFCGuard can identify JFC attack in an effective way. Our work aims to complement existing research results and stimulate more research in this area. (C) 2017 Elsevier Ltd. All rights reserved.
机译:智能手机已成为人们生活中的必需品,因此,全世界越来越多的公共充电站正在部署中,以满足不断增长的电话充电需求(例如,在机场,地铁,商店等)。但是,这种情况可能会为网络罪犯敞开一个漏洞,以发动各种攻击,尤其是收费攻击,并威胁用户的隐私。例如,果汁拍摄计费(JFC)攻击能够通过在整个计费期间自动记录电话屏幕并监视用户的输入,从而从Android OS和iOS设备窃取用户的敏感和私人信息。更重要的是,这种攻击不需要任何许可,也不需要在用户端安装任何应用程序。其基本原理是可以通过采用移动高清链接(MHL)标准的标准微型USB连接器泄漏用户信息。出于对JFC攻击的潜在破坏的动机,在这项工作中,我们研究了JFC攻击对处理器使用(包括CPU和GPU使用)的影响。发现将手机连接到JFC充电器时,JFC攻击会导致使用率显着增加。然后,我们设计了一种称为JFCGuard的安全机制,可以根据针对智能手机用户的处理器使用情况分析来检测JFC攻击。在评估中,我们进行了有250多名参与者的用户研究,结果表明JFCGuard可以有效地识别JFC攻击。我们的工作旨在补充现有的研究成果,并刺激该领域的更多研究。 (C)2017 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号