Robust smartphone app identification via encrypted network traffic analysis

The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. In addition, the presence or absence of particular apps on a smartphone can inform an adversary, who is intent on attacking the device. In this pap...

Full description

Bibliographic Details
Main Authors: Taylor, V, Spolaor, R, Conti, M, Martinovic, I
Format: Journal article
Published: Institute of Electrical and Electronics Engineers 2017
_version_ 1797059541042462720
author Taylor, V
Spolaor, R
Conti, M
Martinovic, I
author_facet Taylor, V
Spolaor, R
Conti, M
Martinovic, I
author_sort Taylor, V
collection OXFORD
description The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. In addition, the presence or absence of particular apps on a smartphone can inform an adversary, who is intent on attacking the device. In this paper, we show that a passive eavesdropper can feasibly identify smartphone apps by fingerprinting the network traffic that they send. Although SSL/TLS hides the payload of packets, sidechannel data, such as packet size and direction is still leaked from encrypted connections. We use machine learning techniques to identify smartphone apps from this side-channel data. In addition to merely fingerprinting and identifying smartphone apps, we investigate how app fingerprints change over time, across devices, and across different versions of apps. In addition, we introduce strategies that enable our app classification system to identify and mitigate the effect of ambiguous traffic, i.e., traffic in common among apps, such as advertisement traffic. We fully implemented a framework to fingerprint apps and ran a thorough set of experiments to assess its performance. We fingerprinted 110 of the most popular apps in the Google Play Store and were able to identify them six months later with up to 96% accuracy. Additionally, we show that app fingerprints persist to varying extents across devices and app versions.
first_indexed 2024-03-06T20:05:45Z
format Journal article
id oxford-uuid:28d972cf-3c55-4448-aae9-ec2a0865dfff
institution University of Oxford
last_indexed 2024-03-06T20:05:45Z
publishDate 2017
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:28d972cf-3c55-4448-aae9-ec2a0865dfff2022-03-26T12:15:30ZRobust smartphone app identification via encrypted network traffic analysisJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:28d972cf-3c55-4448-aae9-ec2a0865dfffSymplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2017Taylor, VSpolaor, RConti, MMartinovic, IThe apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. In addition, the presence or absence of particular apps on a smartphone can inform an adversary, who is intent on attacking the device. In this paper, we show that a passive eavesdropper can feasibly identify smartphone apps by fingerprinting the network traffic that they send. Although SSL/TLS hides the payload of packets, sidechannel data, such as packet size and direction is still leaked from encrypted connections. We use machine learning techniques to identify smartphone apps from this side-channel data. In addition to merely fingerprinting and identifying smartphone apps, we investigate how app fingerprints change over time, across devices, and across different versions of apps. In addition, we introduce strategies that enable our app classification system to identify and mitigate the effect of ambiguous traffic, i.e., traffic in common among apps, such as advertisement traffic. We fully implemented a framework to fingerprint apps and ran a thorough set of experiments to assess its performance. We fingerprinted 110 of the most popular apps in the Google Play Store and were able to identify them six months later with up to 96% accuracy. Additionally, we show that app fingerprints persist to varying extents across devices and app versions.
spellingShingle Taylor, V
Spolaor, R
Conti, M
Martinovic, I
Robust smartphone app identification via encrypted network traffic analysis
title Robust smartphone app identification via encrypted network traffic analysis
title_full Robust smartphone app identification via encrypted network traffic analysis
title_fullStr Robust smartphone app identification via encrypted network traffic analysis
title_full_unstemmed Robust smartphone app identification via encrypted network traffic analysis
title_short Robust smartphone app identification via encrypted network traffic analysis
title_sort robust smartphone app identification via encrypted network traffic analysis
work_keys_str_mv AT taylorv robustsmartphoneappidentificationviaencryptednetworktrafficanalysis
AT spolaorr robustsmartphoneappidentificationviaencryptednetworktrafficanalysis
AT contim robustsmartphoneappidentificationviaencryptednetworktrafficanalysis
AT martinovici robustsmartphoneappidentificationviaencryptednetworktrafficanalysis