Who do you sync you are?: smartphone fingerprinting via application behaviour

  • Authors:
  • Tim Stöber;Mario Frank;Jens Schmitt;Ivan Martinovic

  • Affiliations:
  • TU Kaiserslautern, Kaiserslautern, Germany;UC Berkley, Berkley, USA;TU Kaiserslautern, Kaiserslautern, Germany;University of Oxford, Oxford, United Kingdom

  • Venue:
  • Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by the user, most applications generate characteristic traffic from their background activities, such as periodic update requests or server synchronisation. Although the encryption of transmitted data in 3G networks prevents an eavesdropper from analysing the content, periodic traffic patterns leak side-channel information like timing and data volume. In this work, we extract such side-channel features from network traffic generated from the most popular applications, such as Facebook, WhatsApp, Skype, Dropbox, and others, and evaluate whether they can be used to reliably identify a smartphone. By computing fingerprints from approx,6,hours of background traffic, we show that 15 minutes of monitored traffic suffice to reliably identify a smartphone based on its behavioural fingerprint with a success probability of 90%.