论文标题

通过处理器工作负载,在边缘设备上的申请秘密协会

Covert Association of Applications on Edge Devices by Processor Workload

论文作者

Li, Hangtai, Liu, Yingbo, Tan, Rui

论文摘要

涉及激励第三方应用程序供应商的应用程序(APP)配电系统是新兴边缘计算系统的理想选择。但是,这样的计划还带来了当前移动应用程序分销系统所面临的各种安全挑战。在本文中,我们研究了一个名为Covert设备协会的威胁,其中两个应用程序的供应商相交,以找出其应用程序安装在同一边缘设备上运行的。如果两个勾结的应用程序很受欢迎,则威胁可用于大规模发射各种类型的进一步攻击。例如,如果用户不对另一个应用程序匿名,则希望保留两个应用程序之一匿名的Edge设备的用户将被匿名化。此外,这两个应用程序的联盟将具有升级的特权集,这是其个人特权集合的结合。在本文中,我们通过基于边缘设备处理器工作负载的可靠且普遍存在的秘密频道实施威胁。运行Android和Android物品的三个边缘设备(两台智能手机和嵌入式计算板)上的实现不需要任何特权权限。我们的实现涵盖了1)在同一Android手机上运行的两个应用程序的三个攻击方案,2)在同一Android手机上运行的TOR浏览器中的一个应用程序和Web会话,以及3)在同一Android Things设备上运行的两个应用程序。实验表明,秘密通道至少给出0.25 bps的数据速率,而秘密设备关联最多需要3.2分钟。

The scheme of application (app) distribution systems involving incentivized third-party app vendors is a desirable option for the emerging edge computing systems. However, such a scheme also brings various security challenges as faced by the current mobile app distribution systems. In this paper, we study a threat named covert device association, in which the vendors of two apps collude to figure out which of their app installations run on the same edge device. If the two colluding apps are popular, the threat can be used to launch various types of further attacks at scale. For example, the user of the compromised edge device, who wishes to remain anonymous to one of the two apps, will be de-anonymized if the user is not anonymous to the other app. Moreover, the coalition of the two apps will have an escalated privilege set that is the union of their individual privilege sets. In this paper, we implement the threat by a reliable and ubiquitous covert channel based on the edge device processor workload. The implementations on three edge devices (two smartphones and an embedded compute board) running Android and Android Things do not require any privileged permissions. Our implementations cover three attack scenarios of 1) two apps running on the same Android phone, 2) an app and a web session in the Tor browser running on the same Android phone, and 3) two apps running on the same Android Things device. Experiments show that the covert channel gives at least 0.25 bps data rate and the covert device association takes at most 3.2 minutes.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源