Publication | Closed Access
I know what you did on your smartphone: Inferring app usage over encrypted data traffic
93
Citations
23
References
2015
Year
Unknown Venue
Mobile SecurityEngineeringEncrypted TrafficInformation SecurityInformation ForensicsSide-channel AttackEnd-to-end EncryptionMobile AnalyticsIdentifiable Traffic PatternsData ScienceWireless SecurityApp UsageInternet Of ThingsData TrafficNetwork SecurityInferring App UsageData PrivacyMobile MalwareMobile ComputingComputer ScienceIeee 802.11PrivacyData SecurityCryptographyEdge Computing
Smartphones and tablets are now ubiquitous in many people's lives and are used throughout the day in many public places. They are often connected to a wireless local area network (IEEE 802.11 WLANs) and rely on encryption protocols to maintain their security and privacy. In this paper, we show that even in presence of encryption, an attacker without access to encryption keys is able to determine the users' behavior, in particular, their app usage. We perform this attack using packet-level traffic analysis in which we use side-channel information leaks to identify specific patterns in packets regardless of whether they are encrypted or not. We show that just by collecting and analyzing small amounts of wireless traffic, one can determine what apps each individual smartphone user in the vicinity is using. Furthermore, and more worrying, we show that by using these apps the privacy of the user is more at risk compared to using online services through browsers on mobile devices. This is due to the fact that apps generate more identifiable traffic patterns. Using random forests to classify the apps we show that we are able to identify individual apps, even in presence of noise, with great accuracy. Given that most online services now provide native apps that may be identified by this method, these attacks represent a serious threat to users' privacy.
| Year | Citations | |
|---|---|---|
Page 1
Page 1