Abstract

Motion sensors, especially accelerometers, on smartphones have been discovered to be a powerful side channel for spying on users' privacy. In this paper, we reveal a new accelerometer-based side-channel attack which is particularly serious: malware on smartphones can easily exploit the accelerometers to trace metro riders stealthily. We first address the challenge to automatically filter out metro-related data from a mass of miscellaneous accelerometer readings, and then propose a basic attack which leverages an ensemble interval classifier built from supervised learning to infer the riding trajectory of the user. As the supervised learning requires the attacker to collect labeled training data for each station interval, this attack confronts the scalability problem in big cities with a huge metro network. We thus further present an improved attack using semi-supervised learning, which only requires the attacker to collect labeled data for a very small number of distinctive station intervals. We conduct real experiments on a large self-built dataset, which contains more than 120 h of data collected from six metro lines of three major cities. The results show that the inferring accuracy could reach 89% and 94% if the user takes the metro for four and six stations, respectively. We finally discuss possible countermeasures against the proposed attack.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.