Subway riders' smartphones could carry tracking malware
Millions of city dwellers with smartphones in hand, pocket or bag, use trains to get around night and day, seven days a week. The incoming message from three researchers in China is that an attacker could track them based on information from a phone's accelerometer. The three, from Nanjing University, have completed a study which went up on the arXiv server earlier this month. "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones" describes the attack.
Patrick Howell O'Neill in the Daily Dot, said the research was about an " attack that learns each subway's fingerprint and then installs malware on a target's phone that steals accelerometer readings."
No GPS is involved in this type of attack, which works underground. (The authors said that "metro trains often run underground, where GPS is disabled.") They said that if "a person with a smartphone takes the metro, a malicious application" uses accelerometer readings to trace the person, to infer where the victim gets on and off the train. They said that "metro trains run on tracks, making their motion patterns distinguishable from cars or buses running on ordinary roads."
It is possible, they wrote, "that the running of a train between two neighboring stations produces a distinctive fingerprint in the readings of 3-axis accelerometer of the mobile device, leveraging which attackers can infer the riding trace of a passenger."
The researchers raised three concerns. First, it's easy for attackers to create stealthy malware to eavesdrop on the accelerometer. Second, the metro, they said, is the preferred transportation means for most people in major cities. The last point is that metro-riding traces can be used to further infer other private information. "For example, if an attacker can trace a smartphone user for a few days, he may be able to infer the user's daily schedule and living/working areas and thus seriously threaten her physical safety." What is more, an attacker may find that two individuals often visit the same stations, they said, at "similar non-working times," and may infer a relationship.
The Nanjing University trio said that they were "the first to propose an accelerometer-based side channel attack for inferring metro-riders' traces."
They conducted their experiment on a Nanjing metro line. They found that the inferring accuracy reached 92 percent if the user took the metro for six stations.
Could one tell or at least suspect if such malware were operating in the background? O'Neill said one interesting defense against such a hack would be to scrutinize the phone's power consumption. "To track someone using this method, a hacker would have to continuously access the phone's accelerometer, draining significant power no matter how well the malware was concealed," he said. By monitoring the phone's power consumption, one may see when an app is using too much of the battery.
The authors said that "If malware intends to steal the users' privacy through sensor data, constant request for the data from sensors will evidently boost the power consumption. No matter how the malware tries to conceal itself, the acquisition of sensor data will lead to an increasing power consumption of the smartphone."
- TAMS SEMICONDUCTOR LIMITED
Patrick Howell O'Neill in the Daily Dot, said the research was about an " attack that learns each subway's fingerprint and then installs malware on a target's phone that steals accelerometer readings."
No GPS is involved in this type of attack, which works underground. (The authors said that "metro trains often run underground, where GPS is disabled.") They said that if "a person with a smartphone takes the metro, a malicious application" uses accelerometer readings to trace the person, to infer where the victim gets on and off the train. They said that "metro trains run on tracks, making their motion patterns distinguishable from cars or buses running on ordinary roads."
It is possible, they wrote, "that the running of a train between two neighboring stations produces a distinctive fingerprint in the readings of 3-axis accelerometer of the mobile device, leveraging which attackers can infer the riding trace of a passenger."
The researchers raised three concerns. First, it's easy for attackers to create stealthy malware to eavesdrop on the accelerometer. Second, the metro, they said, is the preferred transportation means for most people in major cities. The last point is that metro-riding traces can be used to further infer other private information. "For example, if an attacker can trace a smartphone user for a few days, he may be able to infer the user's daily schedule and living/working areas and thus seriously threaten her physical safety." What is more, an attacker may find that two individuals often visit the same stations, they said, at "similar non-working times," and may infer a relationship.
The Nanjing University trio said that they were "the first to propose an accelerometer-based side channel attack for inferring metro-riders' traces."
They conducted their experiment on a Nanjing metro line. They found that the inferring accuracy reached 92 percent if the user took the metro for six stations.
Could one tell or at least suspect if such malware were operating in the background? O'Neill said one interesting defense against such a hack would be to scrutinize the phone's power consumption. "To track someone using this method, a hacker would have to continuously access the phone's accelerometer, draining significant power no matter how well the malware was concealed," he said. By monitoring the phone's power consumption, one may see when an app is using too much of the battery.
The authors said that "If malware intends to steal the users' privacy through sensor data, constant request for the data from sensors will evidently boost the power consumption. No matter how the malware tries to conceal itself, the acquisition of sensor data will lead to an increasing power consumption of the smartphone."
- TAMS SEMICONDUCTOR LIMITED