I know what you did on your smartphone: Inferring app usage over encrypted data traffic

作者: Qinglong Wang , Amir Yahyavi , Bettina Kemme , Wenbo He

DOI: 10.1109/CNS.2015.7346855

关键词: WirelessInternet privacyComputer scienceTraffic analysisNoise (video)Network packetMobile deviceEncryptionWi-FiCryptographic protocolComputer security

摘要: Smartphones and tablets are now ubiquitous in many people's lives used throughout the day public places. They often connected to a wireless local area network (IEEE 802.11 WLANs) rely on encryption protocols maintain their security privacy. In this paper, we show that even presence of encryption, an attacker without access keys is able determine users' behavior, particular, app usage. We perform attack using packet-level traffic analysis which use side-channel information leaks identify specific patterns packets regardless whether they encrypted or not. just by collecting analyzing small amounts traffic, one can what apps each individual smartphone user vicinity using. Furthermore, more worrying, these privacy at risk compared online services through browsers mobile devices. This due fact generate identifiable patterns. Using random forests classify apps, noise, with great accuracy. Given most provide native may be identified method, attacks represent serious threat

参考文章(24)
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Qixiang Sun, D.R. Simon, Yi-Min Wang, W. Russell, V.N. Padmanabhan, Lili Qiu, Statistical identification of encrypted Web browsing traffic ieee symposium on security and privacy. pp. 19- 30 ,(2002) , 10.1109/SECPRI.2002.1004359
Jian Du, Yik-Chung Wu, Distributed Clock Skew and Offset Estimation in Wireless Sensor Networks: Asynchronous Algorithm and Convergence Analysis IEEE Transactions on Wireless Communications. ,vol. 12, pp. 5908- 5917 ,(2013) , 10.1109/TWC.2013.100213.130553
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren, RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications Tsinghua Science & Technology. ,vol. 18, pp. 100- 117 ,(2013) , 10.1109/TST.2013.6449413
Andrew W. Moore, Denis Zuev, Internet traffic classification using bayesian analysis techniques measurement and modeling of computer systems. ,vol. 33, pp. 50- 60 ,(2005) , 10.1145/1064212.1064220
Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi, No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone international conference on distributed computing systems. pp. 218- 227 ,(2014) , 10.1109/ICDCS.2014.30
Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, Xue Liu, Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing IEEE Transactions on Wireless Communications. ,vol. 13, pp. 86- 98 ,(2014) , 10.1109/TWC.2013.121013.121473
Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu, Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android computer and communications security. pp. 7- 18 ,(2015) , 10.1145/2714576.2714589
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang, Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow ieee symposium on security and privacy. pp. 191- 206 ,(2010) , 10.1109/SP.2010.20