Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
Pavel Lifshits, Roni Forte , Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein
Power to peep-all: Inference Attacks by Malicious Batteries on - - PowerPoint PPT Presentation
Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices Pavel Lifshits, Roni Forte , Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein Speaker: Pavel Lifshits SMART BATTERY
Pavel Lifshits, Roni Forte , Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein
By Microsoft & Tesla
See spec. http://sbs-forum.org/specs/
Keystroke inference Combination of multiple attacks
Known Event?
Classifier
Label
Novelty Detector
Ignore Classify Device Active?
Activity Detector
Ignore
Known Webpage?
Webpage Classifier
Webpage
Novelty Detector
Ignore Classify Webpage Device Active?
Activity Detector
Ignore
Known Webpage?
Webpage Classifier
Webpage
Novelty Detector
Ignore Classify Webpage Device Active?
Activity Detector
Ignore
Power requirements - <70 mA phone at rest
Storage
Power requirements - <70 mA phone at rest
Storage
000000000000000000000001110110000001110001110011110111000111000000000000000000000000000000000000000000000000000000000000
Convolutional Neural Network
Convolutional Neural Network
App Battery Status API
Victim
Attacker Malicious Battery Victim
(Section 8)
Mark Silberstein, mark@ee.technion.ac.il Pavel Lifshits, pavell@ef.technion.ac.il