Abstract
We developed a novel, proof-of-concept side-channel attack framework called RouteDetector, which identifies a route for a train trip by simply reading smart device sensors: an accelerometer, magnetometer, and gyroscope. All these sensors are commonly used by many apps without requiring any permissions. The key technical components of RouteDetector can be summarized as follows. First, by applying a machine-learning technique to the data collected from sensors, RouteDetector detects the activity of a user, i.e., “walking,” “in moving vehicle,” or “other.” Next, it extracts departure/arrival times of vehicles from the sequence of the detected human activities. Finally, by correlating the detected departure/arrival times of the vehicle with timetables/route maps collected from all the railway companies in the rider’s country, it identifies potential routes that can be used for a trip. We demonstrate that the strategy is feasible through field experiments and extensive simulation experiments using timetables and route maps for 9,090 railway stations of 172 railway companies.
Original language | English |
---|---|
Publication status | Published - 2015 |
Event | 9th USENIX Workshop on Offensive Technologies, WOOT 2015 - Washington, United States Duration: 2015 Aug 10 → 2015 Aug 11 |
Conference
Conference | 9th USENIX Workshop on Offensive Technologies, WOOT 2015 |
---|---|
Country/Territory | United States |
City | Washington |
Period | 15/8/10 → 15/8/11 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Hardware and Architecture
- Information Systems
- Software