Zero-Permission Acoustic Cross-Device Tracking

被引:0
|
作者
Matyunin, Nikolay [1 ]
Szefer, Jakub [2 ]
Katzenbeisser, Stefan [1 ]
机构
[1] Tech Univ Darmstadt, CYSEC, Darmstadt, Germany
[2] Yale Univ, New Haven, CT USA
关键词
cross-device tracking; ultrasonic communication; covert channels; MEMS gyroscope; web tracking;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Adversaries today can embed tracking identifiers into ultrasonic sound and covertly transmit them between devices without users realizing that this is happening. To prevent such emerging privacy risks, mobile applications now require a request for an explicit user permission, at run-time, to get access to a device's microphone. In this paper, however, we show that current defenses are not enough. We introduce a novel approach to acoustic cross-device tracking, which does not require microphone access, but instead exploits the susceptibility of MEMS gyroscopes to acoustic vibrations at specific (ultrasonic) frequencies. Currently, no permissions are needed to access the gyroscope's data, and the gyroscope can be accessed from apps or even from a web browser. In this manner, gyroscopes in modern smartphones and smartwatches can be used as zero-permission receivers of ultrasonic signals, making cross-device tracking completely unnoticeable to users. We evaluate our approach on several mobile devices using different audio hardware, achieving 10-20bit/s transmission bandwidth at distances from 35cm to 16m in realistic attack scenarios. Finally, we discuss potential countermeasures against the presented attack.
引用
收藏
页码:25 / 32
页数:8
相关论文
共 50 条
  • [1] The Perils of User Tracking Using Zero-Permission Mobile Apps
    Narain, Sashank
    Vo-Huu, Triet D.
    Block, Kenneth
    Noubir, Guevara
    [J]. IEEE SECURITY & PRIVACY, 2017, 15 (02) : 32 - 41
  • [2] LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
    Ye, Quanqi
    Zhang, Yan
    Bai, Guangdong
    Dong, Naipeng
    Liang, Zhenkai
    Dong, Jin Song
    Wang, Haoyu
    [J]. INFORMATION SECURITY, ISC 2019, 2019, 11723 : 299 - 318
  • [3] Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers
    Wu, Wenjia
    Wu, Jianan
    Wang, Yanhao
    Ling, Zhen
    Yang, Ming
    [J]. IEEE ACCESS, 2016, 4 : 8073 - 8083
  • [4] Mobile Devices as Digital Sextants for Zero-Permission Geolocation
    Schwittmann, Lorenz
    Wander, Matthaeus
    Weis, Torben
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 55 - 66
  • [5] A Privacy Analysis of Cross-device Tracking
    Zimmeck, Sebastian
    Li, Jie S.
    Kim, Hyungtae
    Bellovin, Steven M.
    Jebara, Tony
    [J]. PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 1391 - 1408
  • [6] Cross-Device Tracking: Matching Devices and Cookies
    Diaz-Moralesl, Roberto
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2015, : 1699 - 1704
  • [7] DaRoute: Inferring trajectories from zero-permission smartphone sensors
    Roth, Christian
    Dinh, Ngoc Thanh
    Rossberger, Marc
    Kesdogan, Dogan
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [8] Talon: An Automated Framework for Cross-Device Tracking Detection
    Solomos, Konstantinos
    Ilia, Panagiotis
    Ioannidis, Sotiris
    Kourtellis, Nicolas
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 227 - 241
  • [9] Cross-device User Tracking via Hybrid Model
    Liu, Jingwu
    Zhang, Tao
    [J]. 2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 83 - 88
  • [10] Inferring User Routes and Locations using Zero-Permission Mobile Sensors
    Narain, Sashank
    Vo-Huu, Triet D.
    Block, Kenneth
    Noubir, Guevara
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 397 - 413