{"title":"Restricting data leakage through non-obvious features of Android 5 smartphone","authors":"T. Tatarnikova","doi":"10.31799/1684-8853-2019-5-24-29","DOIUrl":null,"url":null,"abstract":"Introduction: The data from the gyroscopic sensor and acceleration sensor of a smartphone are seldom considered as a possibleinformation leakage, which makes the owners of gadgets working under Android 5 operating system or below vulnerable to losingvaluable information. Purpose: Offering a practical way to counteract the reading of data from a smartphone via third-party channels,and developing a mobile application which would help prevent the leakage of information from the gadget owner via side channelsof information transfer. Results: A review of studies was performed demonstrating the vulnerability of Android 5 smartphones toleaks through third-party channels using acoustic cryptanalysis techniques. It is shown that in modern works, the use of acousticcryptanalysis of noise emitted by a keyboard or by microelectronic components of a computer allows you to arrange the leakage ofvaluable data via a smartphone located next to the computer under attack. A mobile application has been developed which creates activeinterference in the form of vibration and audio signal to the malicious application which accesses the accelerometer and gyroscopein order to retrieve information. The results of an experiment are given, demonstrating the ability of the application to successfullyinterfere with the internal sensors of a smartphone by addressing its vibrating output and audio output, and prevent the attacks overthird-party channels. Practical relevance: The proposed application installed on a smartphone will allow you to communicate moresafely, enter passwords and type secret information on a computer keyboard with a smartphone in its close proximity.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatsionno-Upravliaiushchie Sistemy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31799/1684-8853-2019-5-24-29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 3
Abstract
Introduction: The data from the gyroscopic sensor and acceleration sensor of a smartphone are seldom considered as a possibleinformation leakage, which makes the owners of gadgets working under Android 5 operating system or below vulnerable to losingvaluable information. Purpose: Offering a practical way to counteract the reading of data from a smartphone via third-party channels,and developing a mobile application which would help prevent the leakage of information from the gadget owner via side channelsof information transfer. Results: A review of studies was performed demonstrating the vulnerability of Android 5 smartphones toleaks through third-party channels using acoustic cryptanalysis techniques. It is shown that in modern works, the use of acousticcryptanalysis of noise emitted by a keyboard or by microelectronic components of a computer allows you to arrange the leakage ofvaluable data via a smartphone located next to the computer under attack. A mobile application has been developed which creates activeinterference in the form of vibration and audio signal to the malicious application which accesses the accelerometer and gyroscopein order to retrieve information. The results of an experiment are given, demonstrating the ability of the application to successfullyinterfere with the internal sensors of a smartphone by addressing its vibrating output and audio output, and prevent the attacks overthird-party channels. Practical relevance: The proposed application installed on a smartphone will allow you to communicate moresafely, enter passwords and type secret information on a computer keyboard with a smartphone in its close proximity.