LOCATION TRACKING USING MOBILE DEVICE POWER ANALYSIS

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Applications of one-class classification
Feedback of Amplifier Circuits I
Green Network Project Contract
Word Spotting DTW.
Is there Safety in Numbers against Side Channel Leakage? Colin D. Walter UMIST, Manchester, UK
L.M. McMillin NOAA/NESDIS/ORA Regression Retrieval Overview Larry McMillin Climate Research and Applications Division National Environmental Satellite,
Lab 2 Lab 3 Homework Labs 4-6 Final Project Late No Videos Write up
Using Probabilistic Methods for Localization in Wireless Networks Presented by Adam Kariv May, 2005.
Robust Object Tracking via Sparsity-based Collaborative Model
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
1 Graphical Models in Data Assimilation Problems Alexander Ihler UC Irvine Collaborators: Sergey Kirshner Andrew Robertson Padhraic Smyth.
1 Integration of Background Modeling and Object Tracking Yu-Ting Chen, Chu-Song Chen, Yi-Ping Hung IEEE ICME, 2006.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Sampling Distributions
Hand Signals Recognition from Video Using 3D Motion Capture Archive Tai-Peng Tian Stan Sclaroff Computer Science Department B OSTON U NIVERSITY I. Introduction.
Software Process and Product Metrics
MobiSteer: Using Steerable Beam Directional Antenna for Vehicular Network Access Vishnu Navda, Anand Prabhu Subramanian, Kannon Dhanasekaran, Andreas Timm-Giel,
A Pattern Matching Method for Finding Noun and Proper Noun Translations from Noisy Parallel Corpora Benjamin Arai Computer Science and Engineering Department.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
GPS Trajectories Analysis in MOPSI Project Minjie Chen SIPU group Univ. of Eastern Finland.
Presented by: Chaitanya K. Sambhara Paper by: Maarten Ditzel, Caspar Lageweg, Johan Janssen, Arne Theil TNO Defence, Security and Safety, The Hague, The.
Dynamic and Decentralized Approaches for Optimal Allocation of Multiple Resources in Virtualized Data Centers Wei Chen, Samuel Hargrove, Heh Miao, Liang.
Inferno : Side-channel Attacks for Mobile Web Browsers Manuel Philipose, Matthew Halpern, Pavel Lifshits, Mark Silberstein, Mohit Tiwari Background and.
Particle Filtering in Network Tomography
Irfan Essa, Alex Pentland Facial Expression Recognition using a Dynamic Model and Motion Energy (a review by Paul Fitzpatrick for 6.892)
CS910: Foundations of Data Analytics Graham Cormode Time Series Analysis.
TEMPLATE DESIGN © Detecting User Activities Using the Accelerometer on Android Smartphones Sauvik Das, Supervisor: Adrian.
/09/dji-phantom-crashes-into- canadian-lake/
Outline What Neural Networks are and why they are desirable Historical background Applications Strengths neural networks and advantages Status N.N and.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
黃福銘 (Angus F.M. Huang) ANTS Lab, IIS, Academia Sinica TrajPattern: Mining Sequential Patterns from Imprecise Trajectories.
Bayesian networks Classification, segmentation, time series prediction and more. Website: Twitter:
Managing Handoff. For operations and management to detect and isolating Handoff being particularly challenging, therefore it is important to understand.
DAVIS AQUILANO CHASE PowerPoint Presentation by Charlie Cook F O U R T H E D I T I O N Forecasting © The McGraw-Hill Companies, Inc., 2003 chapter 9.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Policy Enabled Handoff Across Heterogeneous Wireless Networks Helen W and Jochen Giese Computer Science, Berkeley.
Brian Macpherson Ph.D, Professor of Statistics, University of Manitoba Tom Bingham Statistician, The Boeing Company.
ECE738 Advanced Image Processing Face Detection IEEE Trans. PAMI, July 1997.
7.1: What is a Sampling Distribution?!?!. Section 7.1 What Is a Sampling Distribution? After this section, you should be able to… DISTINGUISH between.
EngD Research Methods Dan Williams October 2014.
Real-Time Simultaneous Localization and Mapping with a Single Camera (Mono SLAM) Young Ki Baik Computer Vision Lab. Seoul National University.
Section 7-3 Estimating a Population Mean: σ Known.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Time Parallel Simulations I Problem-Specific Approach to Create Massively Parallel Simulations.
ENGM 620: Quality Management Session 8 – 30 October 2012 Process Capability.
Course14 Dynamic Vision. Biological vision can cope with changing world Moving and changing objects Change illumination Change View-point.
By Kejia Zhang PowerSpy: Location Tracking using Mobile Device Power Analysis Yan Michalevsky, Aaron Schulman, etc. Stanford University Published in USENIX.
Remote Timing Attacks are Practical David Brumley Dan Boneh [Modified by Somesh.
Preserving Privacy GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady Presenter:Yao Lu ECE 256, Spring.
Nonlinear differential equation model for quantification of transcriptional regulation applied to microarray data of Saccharomyces cerevisiae Vu, T. T.,
Occlusion Tracking Using Logical Models Summary. A Variational Partial Differential Equations based model is used for tracking objects under occlusions.
Particle Filter for Robot Localization Vuk Malbasa.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
Sampling Distributions
Process Capability and Capability Index
핵심어 검출을 위한 단일 끝점 DTW 알고리즘 Yong-Sun Choi and Soo-Young Lee
Chapter 25: Advanced Data Types and New Applications
R-CNN region By Ilia Iofedov 11/11/2018 BGU, DNN course 2016.
Vehicle Segmentation and Tracking from a Low-Angle Off-Axis Camera
Computational Tools for Stem Cell Biology
Radio Propagation Simulation Based on Automatic 3D Environment Reconstruction D. He A novel method to simulate radio propagation is presented. The method.
Data and Computer Communications
Multiple Target Localization Based on Alternate Iteration in Wireless Sensor Networks Zhongyou Song, Jie Li , Yuanhong Zhong, Yao Zhou.
Bartendr: A Practical Approach to Energy-aware Cellular Data Scheduling Aaron Schulman, Vishnu Navday, Ramachandran Ramjeey, Neil Spring, Pralhad Deshpandez,
Computational Tools for Stem Cell Biology
Information Sciences and Systems Lab
Evaluation David Kauchak CS 158 – Fall 2019.
Presentation transcript:

LOCATION TRACKING USING MOBILE DEVICE POWER ANALYSIS POWERSPY LOCATION TRACKING USING MOBILE DEVICE POWER ANALYSIS Yan Michalevsky(1), Gabi Nakibly(2), Dan Boneh(1) and Aaron Schulman(1) (1) Stanford University, (2) National Research and Simulation Center, Rafael Ltd. Presented by Brad Holliday

SMARTPHONE LOCATION ≈ OWNER LOCATION

Requires Permissions ACCESSING LOCATION Even coarse location based on cellular network information Requires Permissions

READING VOLTAGE AND CURRENT /sys/class/power_supply/battery/voltage_now /sys/class/power_supply/battery/current_now Does Not Require Permissions

Power usage can reveal location Power = f (Signal Strength) We assume a malicious application is installed on the victim’s device and runs in the background. The application has no permission to access the GPS or any other location data such as the cellular or WiFi components. In particular, the application has no permission to query the identity of visible cellular base stations or the SSID of visible WiFi networks. We only assume access to power data (which requires no special permissions on Android) and permission to communicate with a remote server. Network connectivity is needed to generate dummy low rate traffic to prevent the cellular radio from going into low power state. In our setup we also use network connectivity to send data to a central server for processing. However, it may be possible to do all processing on the phone.1 As noted earlier, the application can only read the aggregate power consumed by the phone. It cannot measure the power consumed by the cellular radio alone. This presents a significant challenge since many components on the phone consume variable amounts of power at any given time. Consequently, all the measurements are extremely noisy and we need a way to “see” though the noise. To locate the phone, we assume the attacker has prior knowledge of the area or routes through which the victim is traveling. This knowledge allows the attacker to measure the power consumption profile of different routes in that area in advance. Our system correlates this data with the phone’s measured power usage and we show that, despite the noisy measurements, we are able to correctly locate the phone. Alternatively, as for many other machine learning cases, the training data can also be collected after obtaining the unlabeled query data. For instance, an attacker obtained a power consumption profile of a user, the past location of whom it is extremely important to determine. She can still collect, after the fact, reference profiles for a limited area in which the user has likely been driving and carry out the attack. For this to work we need the tracked phone to be moving by a car or a bus while being tracked. Our system cannot locate a phone that is standing still since that only provides the power profile for a single location. We need multiple adjacent locations for the attack to work. Threat Model

SIGNAL STRENGTH DEPENDS ON GEOGRAPHY AND ENVIRONMENT Distance to base station is the primary factor that determines signal strength Also affected by objects in the signal path, trees and buildings Finally, depends on multi-path interference caused by objects that reflect the radio signal back to the phone through paths having different lengths However, signal strength can be fairly consistent as base stations and objects are fairly stationary

SIGNAL STRENGTH STABILITY We first demonstrate that signal strength in each location on a drive can be static over the course of several days. We collected signal strength measurements from a smartphone once, and again several days later. In Figure 1 we plot the signal strength observed on these two drives. In this figure it is apparent that (1) the segments of the drive where signal strength is high (green) and low (red) are in the same locations across both days, and (2) that the progression of signal strength Signal strength profiles measured on two different days are stable

POWER PROFILE CONSISTENCY The results presented in Figure 3 indicate that there is similarity between different models that could allow one model to be used as a reference for another. This experiment serves as a proof of concept: we leave further evaluation of such an attack scenario, where the attacker and victim use different phone models, to future work. In this paper, we assume that the attacker can obtain reference power measurements using the same phone model as the victim. Two Phones Same Model, Same Drive Different Models, Same Drive

WHAT CAN WE ACHIEVE BY THAT? 1. Route distinguishability 3. New route inference 2. Real-time motion tracking The experiments

Related Work Power analysis = powerful side channel High sample rate power traces for externally connected power monitors to recover private encryption keys from a cryptographic system KOCHER, P., JAFFE, J., AND JUN, B. Differential power analysis. In Advances in Cryptology – CRYPTO’99 (1999), Springer, pp. 388–397. Relationship between signal strength and power consumption in smartphones Bartendr: demonstrated that paths of signal strength measurements are stable across several drives SCHULMAN, A., SPRING, N., NAVDA, V., RAMJEE, R., DESHPANDE, P., GRUNEWALD, C., PADMANABHAN, V. N., AND JAIN, K. Bartendr: a practical approach to energy-aware cellular data scheduling. MOBICOM (2010)

1. Route distinguishability Collection of power consumption profiles Each power profile is a time-series Classifier based on time series comparison using Dynamic Time Warping (DTW) Profiles have different baselines and variability, so clean up prior to DTW Normalization: Calculate mean and subtract it, and divide the result by the standard deviation Smoothing: using a moving average filter to reduce noise Down sample: by a factor of 10 to reduce computational complexity Because different rides along the same route can vary in speed at different locations along the ride, and because routes having the same label can vary slightly at certain points (especially before getting to a highway and after exiting it), we need to compare profile features that can vary in time and length and allow for a certain amount of difference. We also have to compensate for different baselines in power consumption due to constant components that depend on the running applications and on differences in device models.

DYNAMIC TIME WARPING Euclidian Distance DTW Distance Dynamic time warping (DTW) is a time series alignment algorithm developed originally for speech recognition(1). It aims at aligning two sequences of feature vectors by warping the timeaxis iteratively until an optimal match (according to a suitable metrics) between the two sequences is found Euclidian Distance DTW Distance

A classification problem Compute the DTW distance between the new power profile and all reference profiles Select the known route that yields the minimal distance

distinguish between routes Results Unique Routes # Ref. Profiles/Route # Test Success % Random Guess % 8 10 55 85 13 17 5 119 71 6 4 136 68 21 3 157 61 25 2 182 53 29 1 211 40

2. REAL-TIME TRACKING 3 Approaches 1. A window of received samples is a subsequence of the reference power profile 2. Infer location from reference profile 3. Route is known 3 Approaches Tracking via Dynamic Time Warping (DTW) Improved tracking via a motion model Tracking using Optimal Subsequence Bijection (OSB) similar to that of route distinguishability use only the measurements collected up to this point, which comprise a sub-sequence of the entire route profile Use Subsequence DTW algorithm Instead of classic DTW search a sub-sequence in a larger sequence return a distance measure as well as the corresponding start and end offsets. search the sequence of measurements so far in all reference profiles and select profile that yields minimal DTW distance. The location estimate corresponds to the location associated with the end offset returned by the algorithm.

Improved tracking using a simple motion model Algorithm locked  false //Are we locked on target? while target moving do loc[i], score  estimateLocation() d  getDistance(loc[i], loc[i – 1]) if locked and d > MAX_DISP then loc[i]  loc [i – 1] //Resume previous estimate end if if score > THRESHOLD then locked  true end while While the previous approach can make mistakes in location estimation due to a match with an incorrect location know when we are “locked” on the target define a similarity threshold so that if the minimal DTW distance is above this threshold, we are in a locked state Once locked on the target, we perform a simple sanity check at each iteration: “Has the target displaced by more than X?” If the sanity check does not pass estimate unlikely accurate output the previous estimate as the new estimated location Similarity below threshold, we switch to an unlocked state stop performing sanity check until “locked” again.

Optimal Subsequence Bijection Similar to DTW DTW assumes the reference profile contains no noise OSB deals with noise in either the reference profile or target sequence Can skip elements in either sequence

Real-time mobile device tracking results 10 training profiles and an additional test profile. The evaluation simulates the conditions of real-time tracking by serially feeding samples to the algorithm as if they are received from an application installed on the device. We calculate the estimation error, i.e. the distance between the estimated coordinates and the true location of the mobile device at each step of the simulation. We are interested in the convergence time, i.e. the number of samples it takes until the location estimate is close enough to the true location, as well as in the distribution of the estimation errors given by a histogram of the absolute values of the distances. (a) Errors histogram. Almost 90% of the errors are less than 1 km. (b) Improved tracking algorithm removed the big errors OSB vs DTW OSB outperforms DTW most of the time

3. New route inference Future potential routes are not explicitly known Goal: Identify the final location after it traverses and unknown route Assumption: Know the general area Pre-record power profiles of all road segments Given the power profile of the tracked device, reconstruct the unknown route (3) The number of potential routes in the area may be too large to practically pre-record Such as: university campus, neighborhood, small town, highway network (4) Each possible route a mobile device may take is a concatenation of some subset of these road segments (5) The reconstructed route will point to the final location

Hysteresis Hysteresis algorithm is used to decide when to hand-off to a new base station When a signal strength threshold is reached it will hand- off to a new station Results: Two phones in the same location can be attached to two different base stations

Particle filter 2 Algorithms using a Particle Filter evaluated

Inference of new routes results Random Frequent Alg. 3 Combined Nexus 4 #1 33% 65% 48% 80% Nexus 4 #2 31% 56% 72% Nexus 5 20% 32% 55% HTC Desire 22% 40% 41% Assume we know the starting intersection

Paper strengths Proof of concept Novel approach Successful results Machine learning is powerful

Paper weaknesses Too much “pre” information and assumption required Too many variables Device type Cellular service provider Applications likely to be used by the target Requires variability in targets power consumption Too many towers (density) and the signal strength won’t ever decrease Phone not active enough it might go to sleep and then the signal strength wouldn’t impact the power consumption Doesn’t present a realistic threat

POWER CONSUMPTION ≈ LOCATION Final thoughts POWER CONSUMPTION ≈ LOCATION Dangers of a seemingly innocent side channel (Lost In Space)