2016 IEEE Symposium on Security and Privacy (SP) 2016
DOI: 10.1109/sp.2016.32
|View full text |Cite
|
Sign up to set email alerts
|

No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 50 publications
(72 citation statements)
references
References 23 publications
0
71
0
Order By: Relevance
“…Side channels on Android mobile devices have been extensively studied in the past [31], [36], [42], [45], [66], [67], however, little or even no attention has been paid to iOS crossapp side channels. In this section, we first briefly introduce the cross-app isolation on iOS.…”
Section: Background: Ios Cross-app Isolationmentioning
confidence: 99%
See 4 more Smart Citations
“…Side channels on Android mobile devices have been extensively studied in the past [31], [36], [42], [45], [66], [67], however, little or even no attention has been paid to iOS crossapp side channels. In this section, we first briefly introduce the cross-app isolation on iOS.…”
Section: Background: Ios Cross-app Isolationmentioning
confidence: 99%
“…Prior studies that analyze side-channel data traces for inference attacks typically only utilize one data trace to perform the attacks [32], [36], [41], [48], [50], [53]. In these attacks, a single side-channel trace is typically sufficient for the intended attack goals.…”
Section: Attack 1: Classifying User Activitiesmentioning
confidence: 99%
See 3 more Smart Citations