power to peep all inference attacks by malicious
play

Power to peep-all: Inference Attacks by Malicious Batteries on - PowerPoint PPT Presentation

Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices Pavel Lifshits, Roni Forte , Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein Speaker: Pavel Lifshits SMART BATTERY


  1. Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices Pavel Lifshits, Roni Forte , Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein Speaker: Pavel Lifshits

  2. SMART BATTERY  Programmability  Sensors: current, voltage, temperature Why?  Safety overheating, over/under voltage  Extend battery life  Performance

  3. SMART BATTERY - PROGRAMMABILITY Software defined battery Smart battery System (SOSP ‘15) See spec. By Microsoft & Tesla http://sbs-forum.org/specs/

  4. INSIDE SMARTPHONE BATTERY Btemp NFC antenna BSI (battery size/status/system indicator)

  5. INSIDE SMARTPHONE BATTERY Your phone batteries are getting smarter!

  6. Do the smart batteries create a new privacy threat?

  7. Do the smart batteries create a new privacy threat?

  8. IF THE ATTACKER GETS ON YOUR BATTERY  Browsing History

  9. IF THE ATTACKER GETS ON YOUR BATTERY  Browsing History  Applications

  10. IF THE ATTACKER GETS ON YOUR BATTERY  Browsing History  Applications  Typing

  11. IF THE ATTACKER GETS ON YOUR BATTERY  Browsing History  Applications  Typing  Photo shot

  12. IF THE ATTACKER GETS ON YOUR BATTERY  Browsing History  Applications  Typing  Photo shot  Communication profile – Phone calls

  13. AGENDA  General scheme for malicious battery attacks  Examples: Keystroke inference Combination of multiple attacks  Data exfiltration mechanism via browser

  14. METHODOLOGY

  15. METHODOLOGY

  16. METHODOLOGY

  17. METHODOLOGY

  18. APP SPECIFIC PIPELINE Activity Novelty Classifier Detector Detector Device Known Classify Active? Event? Ignore Ignore Label App-specific Classifier

  19. BROWSING HISTORY ATTACK PIPELINE Activity Novelty Webpage Detector Detector Classifier Device Known Classify Active? Webpage? Webpage Ignore Ignore Webpage App-specific Classifier

  20. BROWSING HISTORY ATTACK PIPELINE Activity Novelty Webpage Detector Detector Classifier Device Known Classify Active? Webpage? Webpage Ignore Ignore Webpage App-specific Classifier

  21. CONSTRAINT - FIT INSIDE THE BATTERY Power requirements - <70 mA phone at rest - Computational complexity - Signal sample rate Storage

  22. CONSTRAINT - FIT INSIDE THE BATTERY Power requirements - <70 mA phone at rest - Computational complexity - Signal sample rate Storage

  23. KEYSTROKE INFERENCE

  24. KEYSTROKE INFERENCE 000000000000000000000001110110000001110001110011110111000111000000000000000000000000000000000000000000000000000000000000

  25. KEYSTROKE INFERENCE ' C ' Convolutional Neural Network

  26. KEYSTROKE INFERENCE ' C ' Convolutional Neural Network

  27. KEYSTROKE INFERENCE - RESULTS

  28. COMBINATION OF ATTACKS Top 1 – 18% Top 2 – 30% Top 3 – 40% Top 5 – 50%

  29. EXFILTRATION Wifi / Bluetooth Manipulate voltage App Battery Status API

  30. EXFILTRATION Victim

  31. EXFILTRATION Malicious Battery Attacker Victim

  32. SEE PAPER FOR -  Attacks – (Sections 6 & 7)  Web fingerprinting (open-world, Alexa top 100%)  Keystroke  Camera  Incoming calls  Robustness analysis - (Section 8)  Network conditions  Sample rate  Browsers  Phones  Users  Why Power channel leaks data? (Section 10)  Defenses & Mitigation (Section 11)

  33. THEORETICAL?!

  34. THEORETICAL?!

  35. THEORETICAL?!

  36. QUESTIONS ? Pavel Lifshits, pavell@ef.technion.ac.il Mark Silberstein, mark@ee.technion.ac.il

Recommend


More recommend