• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei. A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392. DOI: 10.7544/issn1000-1239.2018.20170982
Citation: Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei. A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392. DOI: 10.7544/issn1000-1239.2018.20170982

A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy

More Information
  • Published Date: June 30, 2018
  • The defensive research against Android physical sensor-based side-channel attacks mainly aims at the privacy leak which leverage mobile sensors as medium. The current defensive methods are malicious activity detection, virtual keyboards randomization, etc. However, these traditional methods can hardly protect user’s privacy from sensor-based side-channel attacks fundamentally, for the unpredictable user decision and variety of novel attacks. In order to overcome the above problems, this paper presents a defensive method against physical sensor-based side-channel attacks based on differential privacy. This defensive method interferes the process of side-channel construction by injecting random noise coincident with the Laplace distribution which can obfuscate the original sensor data. The primary challenge of the proposal method is reducing the success rate of side-channel attacks as much as possible on the premise that ensuring normal operation of the sensor-based function and user experience. Taking the advantages of a sensor-based function extraction tool SensorTainter we designed, the sensor-based functions are analyzed detailedly and classified according to the types of based sensors and algorithms, thus we estimate the ranges of sensor data obfuscation for each category of sensor-based function. By analyzing 47 144 apps and 9 typical sensor-based side-channel attacks, the experiment proves that our defensive method can effectively defense against sensor-based attacks, which results in an accuracy decrease of 27 percent points at most in one attempt during key-event side-channel attacks and about 7 percent points in tracking side-channel attacks. Because of implementing in Android framework, this defensive method is completely user transparent and has great expansibility.
  • Related Articles

    [1]Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan. A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443. DOI: 10.7544/issn1000-1239.2021.20210589
    [2]Wang Bin, Zhang Lei, Zhang Guoyin. A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630. DOI: 10.7544/issn1000-1239.2020.20190086
    [3]Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan. Weighted Large-Scale Social Network Data Privacy Protection Method[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377. DOI: 10.7544/issn1000-1239.2020.20190018
    [4]Meng Xuying, Zhang Qijia, Zhang Hanwen, Zhang Yujun, Zhao Qinglin. Personalized Privacy Preserving Link Prediction in Social Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1244-1251. DOI: 10.7544/issn1000-1239.2019.20180306
    [5]Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian. Graph Degree Histogram Publication Method with Node-Differential Privacy[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520. DOI: 10.7544/issn1000-1239.2019.20170886
    [6]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [7]Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555
    [8]He Ming, Chang Mengmeng, Wu Xiaofei. A Collaborative Filtering Recommendation Method Based on Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(7): 1439-1451. DOI: 10.7544/issn1000-1239.2017.20160207
    [9]Zhang Xiaojian, Shao Chao, Meng Xiaofeng. Accurate Histogram Release under Differential Privacy[J]. Journal of Computer Research and Development, 2016, 53(5): 1106-1117. DOI: 10.7544/issn1000-1239.2016.20150304
    [10]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
  • Cited by

    Periodical cited type(4)

    1. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 .
    2. 刘东,任海玲. 基于差分隐私的大数据安全访问权限认证仿真. 计算机仿真. 2021(08): 421-424+486 .
    3. 苗新亮,蒋烈辉,常瑞. 访问驱动下的Cache侧信道攻击研究综述. 计算机研究与发展. 2020(04): 824-835 . 本站查看
    4. 唐奔宵,王丽娜,汪润,赵磊,陈青松. 基于Laplace机制的普适运动传感器侧信道防御方案. 软件学报. 2019(08): 2392-2414 .

    Other cited types(5)

Catalog

    Article views (1236) PDF downloads (607) Cited by(9)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return