Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2022
DOI: 10.1145/3503222.3507757
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropping user credentials via GPU side channels on smartphones

Abstract: Graphics Processing Unit (GPU) on smartphones is an effective target for hardware attacks. In this paper, we present a new side channel attack on mobile GPUs of Android smartphones, allowing an unprivileged attacker to eavesdrop the user's credentials, such as login usernames and passwords, from their inputs through onscreen keyboard. Our attack targets on Qualcomm Adreno GPUs and investigate the amount of GPU overdraw when rendering the popups of user's key presses of inputs. Such GPU overdraw caused by each … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 37 publications
(40 reference statements)
0
1
0
Order By: Relevance
“…Data normalization. As mentioned in §IV-B, a keystroke may last from 0.05 to 0.2 seconds on average [76]. Similarly, users may spend different duration on each interface, and the smartphone could launch an app at different speeds.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Data normalization. As mentioned in §IV-B, a keystroke may last from 0.05 to 0.2 seconds on average [76]. Similarly, users may spend different duration on each interface, and the smartphone could launch an app at different speeds.…”
Section: Methodsmentioning
confidence: 99%
“…Next, considering each activity may last a different length of time in every attempt (e.g., a single keystroke may take 0.05-0.2 second [76]), it also normalizes each activity attempt into the same length of time via property-preserving up-sampling (e.g., nearest neighbor interpolation [55]) or down-sampling (e.g., decimation factor [33]) algorithms.…”
Section: B Building User Interaction Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior work uses side-channels such as electromagnetic emanations [24], [60], reflections [7], smartphone accelerometers [37], [45], timing [58], and performance counters [67] to infer keystrokes on personal computers and mobile devices.…”
Section: Related Work a Keystroke Side-channel Attacksmentioning
confidence: 99%