Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network

Published: 30 June 2021 Publication History

Abstract

With the recent advancement of smartphone technology in the past few years, smartphone usage has increased on a tremendous scale due to its portability and ability to perform many daily life tasks. As a result, smartphones have become one of the most valuable targets for hackers to perform cyberattacks, since the smartphone can contain individuals’ sensitive data. Smartphones are embedded with highly accurate sensors. This article proposes BetaLogger, an Android-based application that highlights the issue of leaking smartphone users’ privacy using smartphone hardware sensors (accelerometer, magnetometer, and gyroscope). BetaLogger efficiently infers the typed text (long or short) on a smartphone keyboard using Language Modeling and a Dense Multi-layer Neural Network (DMNN). BetaLogger is composed of two major phases: In the first phase, Text Inference Vector is given as input to the DMNN model to predict the target labels comprising the alphabet, and in the second phase, sequence generator module generate the output sequence in the shape of a continuous sentence. The outcomes demonstrate that BetaLogger generates highly accurate short and long sentences, and it effectively enhances the inference rate in comparison with conventional machine learning algorithms and state-of-the-art studies.

References

[1]
Sara Afzal, Muhammad Asim, Abdul Rehman Javed, Mirza Omer Beg, and Thar Baker. 2021. URLdeepDetect: A deep learning approach for detecting malicious URLs using semantic vector models. J. Netw. Syst. Manage. 29, 3 (2021), 1–27.
[2]
Mamoun Alazab, Suleman Khan, Somayaji Siva Rama Krishnan, Quoc-Viet Pham, M. Praveen Kumar Reddy, and Thippa Reddy Gadekallu. 2020. A multidirectional LSTM model for predicting the stability of a smart grid. IEEE Access 8 (2020), 85454–85463.
[3]
Mamoun Alazab, Robert Layton, Roderic Broadhurst, and Brigitte Bouhours. 2013. Malicious spam emails developments and authorship attribution. In Proceedings of the 4th Cybercrime and Trustworthy Computing Workshop. IEEE, 58–68.
[4]
Giuseppina Andresini, Annalisa Appice, and Donato Malerba. 2020. Dealing with class imbalance in android malware detection by cascading clustering and classification. In Complex Pattern Mining. Springer, Switzerland, 173–187.
[5]
Muhammad Zubair Asghar, Fazli Subhan, Hussain Ahmad, Wazir Zada Khan, Saqib Hakak, Thippa Reddy Gadekallu, and Mamoun Alazab. 2021. Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction. Software: Pract. Exper. 51, 3 (2021), 571–594.
[6]
Jianfeng Cui, Lixin Wang, Xin Zhao, and Hongyi Zhang. 2020. Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. Comput. Commun. 155 (2020), 125–131.
[7]
Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, and Jing Tian. 2020. Gait identification using a new time-warped similarity metric based on smartphone inertial signals. J. Ambient Intell. Human. Comput. 11, 10 (2020), 4041–4053.
[8]
Natarajan Deepa, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, Pubudu N. Pathirana et al. 2020. A survey on blockchain for big data: Approaches, opportunities, and future directions. Retrieved from https://arXiv:2009.00858.
[9]
Sahibsingh A. Dudani. 1976. The distance-weighted k-nearest-neighbor rule. IEEE Trans. Syst. Man, Cybernet. SMC-6, 4 (1976), 325–327.
[10]
Jerome H. Friedman. 2001. Greedy function approximation: A gradient boosting machine. Ann. Stat. 29, 5 (2001), 1189–1232.
[11]
Thippa Reddy Gadekallu, Dharmendra Singh Rajput, M. Praveen Kumar Reddy, Kuruva Lakshmanna, Sweta Bhattacharya, Saurabh Singh, Alireza Jolfaei, and Mamoun Alazab. 2020. A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU. J. Real-Time Image Process. 0, 0 (2020), 1–14.
[12]
Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, and Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervas. Mobile Comput. 25 (2016), 1–25.
[13]
Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, and Waleed S. Alnumay. 2021. DeepAMD: Detection and identification of android malware using high-efficient deep artificial neural network. Future Gen. Comput. Syst. 115 (2021), 844–856.
[14]
Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, and Ohyun Jo. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660.
[15]
Abdul Rehman Javed, Mirza Omer Beg, Muhammad Asim, Thar Baker, and Ali Hilal Al-Bayatti. 2020. AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient Intell. Human. Comput. 0, 0 (2020), 1–14.
[16]
Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, and Mohammad Sayad Haghighi. 2020. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transport. Syst. 0, 0 (2020), 1–10.
[17]
Jae Woong Joo, Seo Yeon Moon, Saurabh Singh, and Jong Hyuk Park. 2017. S-Detector: An enhanced security model for detecting smishing attack for mobile computing. Telecommun. Syst. 66, 1 (2017), 29–38.
[18]
A. Krause, M. Ihmig, E. Rankin, D. Leong, Smriti Gupta, D. Siewiorek, A. Smailagic, M. Deisher, and U. Sengupta. 2005. Trading off prediction accuracy and power consumption for context-aware wearable computing. In Proceedings of the 9th IEEE International Symposium on Wearable Computers (ISWC’05). IEEE, 20–26.
[19]
Jennifer R. Kwapisz, Gary M. Weiss, and Samuel A. Moore. 2011. Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl. 12, 2 (Mar. 2011), 74–82.
[20]
Kaijun Liu, Shengwei Xu, Guoai Xu, Miao Zhang, Dawei Sun, and Haifeng Liu. 2020. A review of android malware detection approaches based on machine learning. IEEE Access 8 (2020), 124579–124607.
[21]
Ignacio Martín, José Alberto Hernández, and Sergio de los Santos. 2019. Machine-learning based analysis and classification of android malware signatures. Future Gen. Comput. Syst. 97 (2019), 295–305.
[22]
Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, and Malik Najmus Saqib. 2020. AdDroid: Rule-based machine learning framework for android malware analysis. Mobile Netw. Appl. 25, 1 (2020), 180–192.
[23]
Sparsh Mittal and Venkat Mattela. 2019. A survey of techniques for improving efficiency of mobile web browsing. Concurr. Comput.: Pract. Exper. 31, 15 (2019), e5126.
[24]
Long Nguyen-Vu, Jinung Ahn, and Souhwan Jung. 2019. Android fragmentation in malware detection. Comput. Secur. 87 (2019), 101573.
[25]
Rui Ning, Cong Wang, ChunSheng Xin, Jiang Li, and Hongyi Wu. 2018. Deepmag: Sniffing mobile apps in magnetic field through deep convolutional neural networks. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’18). IEEE, Athens, Greece, 1–10.
[26]
Dan Ping, Xin Sun, and Bing Mao. 2015. Textlogger: Inferring longer inputs on touch screen using motion sensors. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, New York, 1–12.
[27]
Abdul Rehman, Saif Ur Rehman, Mohibullah Khan, Mamoun Alazab, and Thippa Reddy. 2021. CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 0, 0 (2021), 1–10.
[28]
Zhongru Ren, Haomin Wu, Qian Ning, Iftikhar Hussain, and Bingcai Chen. 2020. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 101 (2020), 102098.
[29]
Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, and Sanglu Lu. 2020. ClickGuard: Exposing hidden click fraud via mobile sensor side-channel analysis. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1–6.
[30]
Khoi-Nguyen Tran, Mamoun Alazab, Roderic Broadhurst et al. 2014. Towards a feature rich model for predicting spam emails containing malicious attachments and URLs. In ANU Research Publications. Australian Computer Society, Australia, 1–10.
[31]
Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, and Ali Kashif Bashir. 2021. DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU). Future Gen. Comput. Syst. 118 (2021), 453–466.
[32]
R. Vinayakumar, Mamoun Alazab, Sriram Srinivasan, Quoc-Viet Pham, Soman Kotti Padannayil, and K. Simran. 2020. A visualized botnet detection system-based deep learning for the internet of things networks of smart cities. IEEE Trans. Industry Appl. 56, 4 (2020), 4436–4456.
[33]
Robert-Andrei Voicu, Ciprian Dobre, Lidia Bajenaru, and Radu-Ioan Ciobanu. 2019. Human physical activity recognition using smartphone sensors. Sensors 19, 3 (2019), 458.
[34]
Suleiman Y. Yerima, Mohammed K. Alzaylaee, and Sakir Sezer. 2019. Machine learning-based dynamic analysis of android apps with improved code coverage. EURASIP J. Info. Secur. 2019, 1 (2019), 4.

Cited By

View all
  • (2024)Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack DetectionIEEE Access10.1109/ACCESS.2024.346566212(138904-138920)Online publication date: 2024
  • (2024)Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel AttacksIEEE Access10.1109/ACCESS.2024.343121812(188435-188453)Online publication date: 2024
  • (2024)Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on SmartphoneArabian Journal for Science and Engineering10.1007/s13369-024-09046-xOnline publication date: 22-Apr-2024
  • Show More Cited By

Index Terms

  1. Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Asian and Low-Resource Language Information Processing
    ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 20, Issue 5
    September 2021
    320 pages
    ISSN:2375-4699
    EISSN:2375-4702
    DOI:10.1145/3467024
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 June 2021
    Accepted: 01 April 2021
    Revised: 01 April 2021
    Received: 01 May 2020
    Published in TALLIP Volume 20, Issue 5

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Natural language processing (NLP)
    2. language modeling
    3. text inference
    4. cyber security
    5. dense neural network
    6. keylogger
    7. side-channel attack

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)34
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack DetectionIEEE Access10.1109/ACCESS.2024.346566212(138904-138920)Online publication date: 2024
    • (2024)Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel AttacksIEEE Access10.1109/ACCESS.2024.343121812(188435-188453)Online publication date: 2024
    • (2024)Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on SmartphoneArabian Journal for Science and Engineering10.1007/s13369-024-09046-xOnline publication date: 22-Apr-2024
    • (2024)Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone SensorsSoftware Engineering and Management: Theory and Application10.1007/978-3-031-55174-1_10(139-158)Online publication date: 3-May-2024
    • (2024)A profiled side‐channel attack detection using deep learning model with capsule auto‐encoder networkTransactions on Emerging Telecommunications Technologies10.1002/ett.497535:4Online publication date: 15-Apr-2024
    • (2023)Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and DefensesTechnologies10.3390/technologies1103007611:3(76)Online publication date: 12-Jun-2023
    • (2023)A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence TechniquesApplied Sciences10.3390/app1314805613:14(8056)Online publication date: 10-Jul-2023
    • (2023)Multichannel CNN-BLSTM Architecture for Speech Emotion Recognition System by Fusion of Magnitude and Phase Spectral Features Using DCCA for Consumer ApplicationsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.323697269:2(226-235)Online publication date: 1-May-2023
    • (2023)Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone Sensors2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)10.1109/SERA57763.2023.10197713(287-294)Online publication date: 23-May-2023
    • (2023)Federated Learning for Privacy Preservation of Healthcare Data From Smartphone-Based Side-Channel AttacksIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2022.317185227:2(684-690)Online publication date: Feb-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media