As the Internet of Things (IoT) continues to grow, smartphones have become an integral part of IoT systems. However, with the increasing amount of personal information stored on smartphones, users' privacy is at risk of being compromised by malicious attackers. Malware detection engines are commonly installed on smartphones to defend against these attacks, but new attacks that can evade these defenses may still emerge. In this paper, we present EavesDroid, a new side-channel attack on Android smartphones that allows an unprivileged attacker to accurately infer fine-grained user behaviors (e.g. viewing messages, playing videos) through the on-screen operations. Our attack relies on the correlation between user behaviors and the return values of system calls. The fact that these return values are affected by many factors, resulting in fluctuation and misalignment, makes the attack more challenging. Therefore, we build a CNN-GRU classification model, apply min-max normalization to the raw data and combine multiple features to identify the fine-grained user behaviors. A series of experiments on different models and systems of Android smartphones show that, EavesDroid can achieve an accuracy of 98% and 86% for already considered user behaviors in test set and real-world settings. To prevent this attack, we recommend malware detection, obfuscating return values or restricting applications from reading vulnerable return values.
翻译:随着物的互联网(IoT)的继续增长,智能手机已成为IoT系统的一个组成部分。然而,随着智能手机上储存的个人信息越来越多,用户隐私有可能受到恶意攻击者的损害。恶意攻击者通常在智能手机上安装马拉威检测引擎,以抵御这些攻击,但可能逃避这些防御的新攻击可能还会出现。在本文中,我们向EavesDroid展示了对Android智能手机的新的侧道攻击,这种攻击使得一个无主攻击者能够通过屏幕操作准确地推断精细的用户行为(例如,观看信息,播放视频),用户隐私有可能受到恶意攻击的伤害。我们的攻击取决于用户行为与系统返回值之间的相互关系。这些返回值受到许多因素的影响,导致波动和不协调,使得袭击更具挑战性。因此,我们建立了一个CNN-GRU分类模型,对原始数据应用微轴的常规化,并结合多种特性来识别精细的用户行为(例如,查看信息,播放视频) 。一系列关于用户行为与系统返回的实验,对98号用户的精确度,对86号用户的精确度和智能测试系统进行精确度。</s>