No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones

Jun 24, 2021·
Xiaoyu Ji
,
Yushi Cheng
,
Wenyuan Xu
,
Yuehan Chi
Hao Pan
Hao Pan
,
Zhuangdi Zhu
,
Chuang-Wen You
,
Yi-Chao Chen
,
Lili Qiu
· 0 min read
Abstract
Mobile devices have emerged as the most popular platforms to access information. However, they have also become a major concern of privacy violation. In this paper, we propose MagAttack, which exploits the electromagnetic side channel of a laptop to guess user activities, i.e., application launching and application operation. The key insight of MagAttack is that applications are discrepant in essence due to the different compositions of instructions, which can be reected on the CPU power consumption, and thus the corresponding EM emissions. MagAttack is challenging since that EM signals are noisy due to the dynamics of applications and the limited sampling rate of the built-in magnetometers in COTS mobile devices. We overcome these challenges and convert noisy coarse-grained EM signals to robust ne-grained features. We implement MagAttack on both an iOS and an Android smartphone without any hardware modication, and evaluate its performance with 13 popular applications, 15 YouTube videos, and 50 top websites in China. The results demonstrate that MagAttack can recognize aforementioned 13 applications with an average accuracy of 99.5%, and gure out the playing operation among 15 videos with an average accuracy of 99.5% and the visiting operation among 50 websites with an average accuracy of 90.4%.
Type
Publication
In Transactions on Mobile Computing