• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei. A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392. DOI: 10.7544/issn1000-1239.2018.20170982
Citation: Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei. A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392. DOI: 10.7544/issn1000-1239.2018.20170982

A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy

More Information
  • Published Date: June 30, 2018
  • The defensive research against Android physical sensor-based side-channel attacks mainly aims at the privacy leak which leverage mobile sensors as medium. The current defensive methods are malicious activity detection, virtual keyboards randomization, etc. However, these traditional methods can hardly protect user’s privacy from sensor-based side-channel attacks fundamentally, for the unpredictable user decision and variety of novel attacks. In order to overcome the above problems, this paper presents a defensive method against physical sensor-based side-channel attacks based on differential privacy. This defensive method interferes the process of side-channel construction by injecting random noise coincident with the Laplace distribution which can obfuscate the original sensor data. The primary challenge of the proposal method is reducing the success rate of side-channel attacks as much as possible on the premise that ensuring normal operation of the sensor-based function and user experience. Taking the advantages of a sensor-based function extraction tool SensorTainter we designed, the sensor-based functions are analyzed detailedly and classified according to the types of based sensors and algorithms, thus we estimate the ranges of sensor data obfuscation for each category of sensor-based function. By analyzing 47 144 apps and 9 typical sensor-based side-channel attacks, the experiment proves that our defensive method can effectively defense against sensor-based attacks, which results in an accuracy decrease of 27 percent points at most in one attempt during key-event side-channel attacks and about 7 percent points in tracking side-channel attacks. Because of implementing in Android framework, this defensive method is completely user transparent and has great expansibility.
  • Related Articles

    [1]Long Saiqin, Huang Jinna, Li Zhetao, Pei Tingrui, Xia Yuanqing. Energy Efficiency Evaluation Method of Data Centers for Cloud-Network Integration[J]. Journal of Computer Research and Development, 2021, 58(6): 1248-1260. DOI: 10.7544/issn1000-1239.2021.20201069
    [2]Xing Baoping, Lü Mengyuan, Jin Peiquan, Huang Guorui, Yue Lihua. Energy-Efficiency Query Optimization for Green Datacenters[J]. Journal of Computer Research and Development, 2019, 56(9): 1821-1831. DOI: 10.7544/issn1000-1239.2019.20180670
    [3]Wang Jiye, Zhou Biyu, Zhang Fa, Shi Xiang, Zeng Nan, Liu Zhiyong. Data Center Energy Consumption Models and Energy Efficient Algorithms[J]. Journal of Computer Research and Development, 2019, 56(8): 1587-1603. DOI: 10.7544/issn1000-1239.2019.20180574
    [4]Ding Youwei, Qin Xiaolin, Liu Liang, Wang Taochun. An Energy Efficient Algorithm for Big Data Processing in Heterogeneous Cluster[J]. Journal of Computer Research and Development, 2015, 52(2): 377-390. DOI: 10.7544/issn1000-1239.2015.20140126
    [5]Liang Junbin, Li Taoshen. A LT-Codes-Based Scheme for Improving Data Persistence in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(7): 1349-1361.
    [6]Fu Xiong, Wang Ruchuan, and Deng Song. An EnergyEfficient Data Storage Method in Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2111-2116.
    [7]Wang Dashan, Huang Liusheng, Xu Hongli, Wu Junmin, Zhang Junxia. Wireless Sensor Network Energy-Efficient Placement Algorithm Based on Vector[J]. Journal of Computer Research and Development, 2008, 45(4): 626-635.
    [8]Liu Xin, Wang Quanyu, and Jin Xuliang. An Energy-Aware Data Gathering and Routing Protocol for WSN[J]. Journal of Computer Research and Development, 2008, 45(1): 83-89.
    [9]Li Fangmin, Xu Wenjun, Liu Xinhua, Hu Siquan. A Real-Time Energy-Aware Cluster-Based Routing Protocol for Wireless Sensor and Actor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 26-33.
    [10]Luo Yuhong, Chen Songqiao, and Wang Jianxin. An Algorithm Based on Mobility Prediction and Probability for Energy-Efficient Multicasting in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 231-237.

Catalog

    Article views (1226) PDF downloads (604) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return