IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057232
|View full text |Cite
|
Sign up to set email alerts
|

POWERFUL: Mobile app fingerprinting via power analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…Yang et al [37] and Chen et al [5] use power trace to infer browsed websites and active apps respectively. While their goals are similar to ours, their methods are inapplicable to malicious battery settings because they focus on a closed-world setup.…”
Section: Related Workmentioning
confidence: 99%
“…Yang et al [37] and Chen et al [5] use power trace to infer browsed websites and active apps respectively. While their goals are similar to ours, their methods are inapplicable to malicious battery settings because they focus on a closed-world setup.…”
Section: Related Workmentioning
confidence: 99%
“…Browser fingerprinting has historically been used by companies to uniquely identify website visitors [15]. In the context of Android, multiple studies have investigated potential techniques for app fingerprinting, leveraging network traffic patterns [9,44,45,52], power consumption [5], memory footprints [22], and UI states [4].…”
Section: Related Workmentioning
confidence: 99%
“…Various methods have been leveraged, for instance, power usage [5], system behavior [6], and network traffic [7,8]. In [5,6], the authors developed malicious Android Apps to collect system information, such as current, voltage, network state, CPU and memory usage, from a victim's device. The collected data were analyzed and machine learning techniques were used to identify the Apps on the victim's device.…”
Section: App Fingerprintingmentioning
confidence: 99%
“…Compared with their approaches, our work does not require to maliciously deploy an additional App [5,6] or a traffic sniff device [7,8] to collect data on the victim's device. Therefore, our approach can launch the sniffing attack easily by incentivizing users to visit our website.…”
Section: App Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation