MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting

06/26/2019
by   Nikolay Matyunin, et al.
0

Recent studies have shown that aggregate CPU usage and power consumption traces on smartphones can leak information about applications running on the system or websites visited. In response, access to such data has been blocked for mobile applications starting from Android 7. In this work, we explore a new source of side-channel leakage for this class of attacks. Our method is based on the fact that electromagnetic activity caused by mobile processors leads to noticeable disturbances in magnetic sensor measurements on mobile devices, with the amplitude being proportional to the CPU workload. Therefore, recorded sensor data can be analyzed to reveal information about ongoing activities. The attack works on a number of devices: We evaluated 59 models of modern smartphones and tablets and observed the reaction of the magnetometer to CPU activity on 39 of them. On selected devices, we were able to successfully identify which application has been opened (with up to 90 web page has been loaded (up to 91 side channel poses a significant risk to end users' privacy, as the sensor data can be recorded from native apps and even from web pages without user permissions. Finally, we discuss possible countermeasures to prevent the presented information leakage.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset