Proceedings of the 11th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2018
DOI: 10.1145/3212480.3212489
|View full text |Cite
|
Sign up to set email alerts
|

Tracking Private Browsing Sessions using CPU-based Covert Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In particular, high CPU workload on a device typically requires more power, which results in a higher magnetic eld produced by the powersupplying wires. Matyunin et al [34] showed that this e ect is observable on a smartphone: Very high CPU activity on a Nexus 5X smartphone (close to 100% of the CPU load) led to a noticeable peak in magnetometer measurements.…”
Section: Reaction Of Magnetometers To Cpu Activitymentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, high CPU workload on a device typically requires more power, which results in a higher magnetic eld produced by the powersupplying wires. Matyunin et al [34] showed that this e ect is observable on a smartphone: Very high CPU activity on a Nexus 5X smartphone (close to 100% of the CPU load) led to a noticeable peak in magnetometer measurements.…”
Section: Reaction Of Magnetometers To Cpu Activitymentioning
confidence: 99%
“…Researchers used magnetometers to receive covert signals from a nearby computer encoded into hard drive activity [17], CPU activity [27], and combined I/O activity [35]. Recently, Matyunin et al [34] proposed a magnetometer-based intra-device covert channel on smartphones. e authors demonstrated that the magnetometer can be a ected by the peak CPU activity, emi ed by an active a acker from a webpage.…”
Section: Exploiting the Reaction Of Magnetometersmentioning
confidence: 99%
See 1 more Smart Citation