Projekte pro Jahr
Abstract
Software-based power side-channel attacks are a significant security threat to modern computer systems, enabling adversaries to extract confidential information. Existing attacks typically exploit direct power signals from dedicated interfaces, as demonstrated in the PLATYPUS attack, or power-dependent timing variations, as in the case of the Hertzbleed attack. As access to direct power signals is meanwhile restricted on more and more platforms, an important question is whether other exploitable power-related signals exist beyond timing proxies.
In this paper, we show that Android mobile devices expose numerous power-related signals that allow power side-channel attacks. We systematically analyze unprivileged sensors provided by the Android sensor framework on multiple devices and show that these sensors expose parasitic influences of the power consumption. Our results include new insights into Android sensor leakage, particularly a novel leakage primitive: the rotation dependent power leakage of the geomagnetic rotation vector sensor. We extensively evaluate the exposed sensors for different information leakage types. We compare them with the corresponding ground truth, achieving correlations greater than 0.9 for some of our tested sensors. In extreme cases, we observe not only statistical results but also, e.g., changes in a compass app’s needle by approximately 30° due to CPU stress. Additionally, we evaluate the capabilities of our identified leakage primitives in two case studies: As a remote attacker via the Google Chrome web browser and as a local attacker running inside an installed app. In particular, we present an end-to-end pixel-stealing attack on different Android devices that effectively circumvents the browser’s cross-origin isolation with a leakage rate of 5 - 10 s per pixel. Lastly, we demonstrate a proof-of-concept AES attack, leaking individual key bytes using our newly discovered leakage primitive.
In this paper, we show that Android mobile devices expose numerous power-related signals that allow power side-channel attacks. We systematically analyze unprivileged sensors provided by the Android sensor framework on multiple devices and show that these sensors expose parasitic influences of the power consumption. Our results include new insights into Android sensor leakage, particularly a novel leakage primitive: the rotation dependent power leakage of the geomagnetic rotation vector sensor. We extensively evaluate the exposed sensors for different information leakage types. We compare them with the corresponding ground truth, achieving correlations greater than 0.9 for some of our tested sensors. In extreme cases, we observe not only statistical results but also, e.g., changes in a compass app’s needle by approximately 30° due to CPU stress. Additionally, we evaluate the capabilities of our identified leakage primitives in two case studies: As a remote attacker via the Google Chrome web browser and as a local attacker running inside an installed app. In particular, we present an end-to-end pixel-stealing attack on different Android devices that effectively circumvents the browser’s cross-origin isolation with a leakage rate of 5 - 10 s per pixel. Lastly, we demonstrate a proof-of-concept AES attack, leaking individual key bytes using our newly discovered leakage primitive.
Originalsprache | englisch |
---|---|
Titel | Network and Distributed System Security Symposium (NDSS) 2025 |
DOIs | |
Publikationsstatus | Angenommen/In Druck - 2025 |
Veranstaltung | Network and Distributed System Security Symposium 2025: NDSS 2025 - San Diego, USA / Vereinigte Staaten Dauer: 23 Feb. 2025 → 28 Feb. 2025 https://www.ndss-symposium.org/ndss2025/ |
Konferenz
Konferenz | Network and Distributed System Security Symposium 2025 |
---|---|
Kurztitel | NDSS 2025 |
Land/Gebiet | USA / Vereinigte Staaten |
Ort | San Diego |
Zeitraum | 23/02/25 → 28/02/25 |
Internetadresse |
Fingerprint
Untersuchen Sie die Forschungsthemen von „Power-Related Side-Channel Attacks using the Android Sensor Framework“. Zusammen bilden sie einen einzigartigen Fingerprint.-
EU - FSSec - Grundlagen für nachhaltige Sicherheit
Gruss, D. (Teilnehmer (Co-Investigator))
1/03/23 → 29/02/28
Projekt: Forschungsprojekt
-
SEIZE - Secure Edge-Geräte für industrielle Zero-Trust Umgebungen
Mangard, S. (Teilnehmer (Co-Investigator))
1/01/22 → 31/12/24
Projekt: Forschungsprojekt