We developed a novel, proof-of-concept side-channel attack framework called RouteDetector, which identifies a route for a train trip by simply reading smart device sensors: an accelerometer, magnetometer, and gyroscope. All these sensors are commonly used by many apps without requiring any permissions. The key technical components of RouteDetector can be summarized as follows. First, by applying a machine-learning technique to the data collected from sensors, RouteDetector detects the activity of a user, i.e., “walking,” “in moving vehicle,” or “other.” Next, it extracts departure/arrival times of vehicles from the sequence of the detected human activities. Finally, by correlating the detected departure/arrival times of the vehicle with timetables/route maps collected from all the railway companies in the rider’s country, it identifies potential routes that can be used for a trip. We demonstrate that the strategy is feasible through field experiments and extensive simulation experiments using timetables and route maps for 9,090 railway stations of 172 railway companies.
|出版ステータス||Published - 2015|
|イベント||9th USENIX Workshop on Offensive Technologies, WOOT 2015 - Washington, United States|
継続期間: 2015 8 10 → 2015 8 11
|Conference||9th USENIX Workshop on Offensive Technologies, WOOT 2015|
|Period||15/8/10 → 15/8/11|
ASJC Scopus subject areas
- コンピュータ ネットワークおよび通信