Undermining User Privacy on Mobile Devices Using AI


Gulmezoglu B., Zankl A., Tol M. C., Islam S., Eisenbarth T., Sunar B.

ACM Asia Conference on Computer and Communications Security (Asia CCS), Auckland, Yeni Zelanda, 9 - 12 Temmuz 2019, ss.214-227 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası:
  • Doi Numarası: 10.1145/3321705.3329804
  • Basıldığı Şehir: Auckland
  • Basıldığı Ülke: Yeni Zelanda
  • Sayfa Sayıları: ss.214-227
  • Anahtar Kelimeler: Artificial Intelligence, Machine Learning, User Privacy, Activity Inference, Cache Attack, Microarchitecture, ARM, Mobile Device, ATTACKS
  • Orta Doğu Teknik Üniversitesi Adresli: Evet

Özet

Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to user privacy. This is because applications leave distinct footprints in the processor, which malware can use to infer user activities. In this work, we show that these inference attacks can greatly be enhanced with advanced AI techniques. In particular, we focus on profiling the activity in the last-level cache (LLC) of ARM processors. We employ a simple Prime+Probe based monitoring technique to obtain cache traces, which we classify with deep learning methods including convolutional neural networks. We demonstrate our approach on an off-the-shelf Android phone by launching a successful attack from an unprivileged, zero-permission app in well under a minute. The app detects running applications, opened websites, and streaming videos with up to 98% accuracy and a profiling phase of at most 6 seconds. This is possible, as deep learning compensates measurement disturbances stemming from the inherently noisy LLC monitoring and unfavorable cache characteristics. In summary, our results show that thanks to advanced AI techniques, inference attacks are becoming alarmingly easy to execute in practice. This once more calls for countermeasures that confine microarchitectural leakage and protect mobile phone applications, especially those valuing the privacy of their users.