期刊文献+

基于差分隐私的Android物理传感器侧信道防御方法 被引量:4

A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy
下载PDF
导出
摘要 Android物理传感器侧信道防御研究主要针对以移动设备传感器为媒介的隐私泄露攻击.当前的防御方案主要为预防检测、虚拟键盘随机化等.然而,防御过程中不可控的用户决策以及层出不穷的新型侧信道攻击,导致传统方案无法从根本上解决基于物理传感器的隐私泄露威胁.针对上述问题,提出了一种基于差分隐私的Android物理传感器侧信道防御方法.通过注入少量的特殊分布噪声,混淆传感器原始数据,进而干扰侧信道构建过程.如何在保证传感器相关功能正常运行与用户体验的前提下,尽可能降低侧信道攻击成功率是面临的最大困难.通过设计并实现传感器相关功能抽取工具SensorTainter,对APP中传感器相关功能进行分析与分类,计算相关功能正常运行时能够承受的传感器数据混淆范围.依据对47 144个APP以及典型传感器侧信道攻击的实验分析结果,证明该防御方案能够有效限制传感器侧信道攻击,单次点击事件攻击的准确率最高减少27个百分点.由于在Android应用框架层构建,该防御方案对于用户完全透明,具有很好的扩展能力. The defensive research against Android physical sensor-based side-channel attacks mainly aims at the privacy leak which leverage mobile sensors as medium.The current defensive methods are malicious activity detection,virtual keyboards randomization,etc. However,these traditional methods can hardly protect user's privacy from sensor-based side-channel attacks fundamentally,for the unpredictable user decision and variety of novel attacks.In order to overcome the above problems,this paper presents a defensive method against physical sensor-based side-channel attacks based on differential privacy.This defensive method interferes the process of side-channel construction by injecting random noise coincident with the Laplace distribution which can obfuscate the original sensor data.The primary challenge of the proposal method is reducing the success rate of side-channel attacks as much as possible on the premise that ensuring normal operation of the sensor-based function and user experience.Taking the advantages of a sensor-based function extraction tool SensorTainter we designed,the sensor-based functions are analyzed detailedly and classified according to the types of based sensors and algorithms,thus we estimate the ranges of sensor data obfuscation for each category of sensor-based function.By analyzing 47 144 apps and 9 typical sensor-based side-channel attacks,the experiment proves that our defensive method can effectively defense against sensor-based attacks,which results in an accuracy decrease of 27 percent points at most in one attempt during key-event side-channel attacks and about 7 percent points in tracking side-channel attacks.Because of implementing in Android framework,this defensive method is completely user transparent and has great expansibility.
作者 唐奔宵 王丽娜 汪润 赵磊 王丹磊 Tang Benxiao;Wang Lina;Wang Run;Zhao Lei;Wang Danlei(Key Laboratory of Aerospace Information Security and Trusted Computing(Wuhan University),Ministry of Education,Wuhan 430072;School of Cyber Science and Engineering,Wuhan University,Wuhan 430072)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第7期1371-1392,共22页 Journal of Computer Research and Development
基金 国家自然科学基金重点项目(U1536204) 国家自然科学基金项目(61672394 61672393)~~
关键词 ANDROID 物理传感器 侧信道 差分隐私 隐私保护 Android physical sensor side channel differential privacy privacy protection
  • 相关文献

参考文献4

二级参考文献106

  • 1Gnawali O, Jang K Y, Pack J, et al. The tenet architecture for tiered sensor networks [C] //Proc of the ACM Conf on Embedded Networked Sensor Systems. New York: ACM, 2006:153-166.
  • 2Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks [C] //Proc of the 3rd Biennial Conf on Innovative Data Systems Research. New York: ACM, 2007:22-32.
  • 3Sheng B, Li Q. Verifiable privacy-preserving range query in two-tiered sensor networks [C] //Proc of the 27th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2008:46-50.
  • 4Shi J, Zhang R, Zhang Y. Secure range queries in tiered sensor networks [C] //Proc of the 28th IEEE Int Conf on Computer Communications. Piscataway, NJ: 1EEE, 2009: 945-953.
  • 5Shi J, Zhang R, Zhang Y. A spatiotemporal approach for secure range queries in tiered sensor networks [J].IEEE Trans on Wireless Communications, 2011, 10(1) : 264-273.
  • 6Chen F, Liu A X. SafeQ: Secure and efficient query processing in sensor networks [C]//Proc of the 29th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2010:1-9.
  • 7Jerry C, Hao Y, Starsky H Y, et al. Design and implementation of cross-domain cooperative firewall [C] // Proc of the IEEE Int Conf on Network Protocols. Piscataway, NJ : IEEE, 2007 : 284-293.
  • 8Liu A X, Chen F. Collaborative enforcement of firewal policies in virtual private networks [C] //Proe of the 27th Annual ACM Syrup on Principles of Distributed Computing. New York: ACM, 2008:95-104.
  • 9Krawczyk H, Canetti R, Bellare M. HMAC: Keyed-hashing for message authentication, RFC 2104 [R]. Reston: lnternet Society, 1997.
  • 10Wu M, Xu J, Tang X, et al. Top-k monitoring in wireless sensor networks [J]. IEEE Trans on Knowledge and Data Engeneering, 2007, 19(7): 962-976.

共引文献39

同被引文献31

引证文献4

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部