Mobile devices often distribute measurements from a single physical sensor to multiple applications using software-based multiplexing. On Android devices, the highest requested sampling frequency is returned to all applications even if other applications request measurements at lower frequencies. In this paper, we comprehensively demonstrate that this design choice exposes practically exploitable side-channels based on frequency-key shifting. By carefully modulating sensor sampling frequencies in software, we show that unprivileged malicious applications can construct reliable spectral covert channels that bypass existing security mechanisms. Moreover, we present a novel variant that allows an unprivileged malicious observer app to fingerprint other victim applications at a coarse-grained level. Both techniques do not impose any special assumptions beyond accessing standard mobile services from unprivileged applications. As such, our work reports side-channel vulnerabilities that exploit subtle yet insecure design choices in mobile sensor stacks.
翻译:移动设备通常使用基于软件的多路传输将测量从单一物理传感器向多个应用分布到多个应用中。 在Android设备上,即使其他应用请求在较低频率进行测量,所请求的最高取样频率也返回到所有应用中。在本文中,我们全面证明,这一设计选择暴露了基于频率转换的可实际利用的侧通道。通过在软件中仔细调控传感器取样频率,我们表明,没有特权的恶意应用可以建造绕过现有安全机制的可靠的光谱隐蔽通道。此外,我们提出了一个新的变体,允许一个没有特权的恶意观察者用应用程序在粗糙的级别上对其他受害者应用进行指纹。两种技术除了从非优先应用中获取标准移动服务之外,没有强加任何特殊假设。因此,我们的工作报告,在移动传感器堆放中利用微妙但不安全的设计选择的侧通道存在脆弱性。