TY - GEN
T1 - A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices
AU - Okazaki, Tatsuya
AU - Kato, Hiroya
AU - Haruta, Shuichiro
AU - Sasase, Iwao
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Website Fingerprinting Attack (WFA) which identifies websites browsed on Android devices is extremely dangerous because it creates an opportunity for stealing private information. As the most feasible WFA method, we focus on a method that can identify a website by using the power consumption model restored from CPU data. However, that is not effective in a real situation where multiple background tasks run because CPU data which are unrelated to browsing are confused. Furthermore, the previous method cannot accurately identify simple websites that are subject to background tasks. Thus, a more feasible method is required to indicate the dangers. In this paper, we propose a website fingerprinting attack based on virtual memory of process on Android device. We focus on the fact that a specific process about browsing websites works when a website is browsed. Because each process has its virtual memory which is independent of each other, the useful feature of a task can be extracted from the virtual memory without noise. Therefore, the proposed method can precisely identify a browsed website by using the virtual memory-based features even if background tasks work. Furthermore, the proposed method can obtain effective information even for a simple website. By computer simulation with a real dataset, we demonstrate that the proposed method can improve up to 86%, 89%, and 82% in precision, recall, and F-measure, respectively for websites which the previous scheme cannot identify at all.
AB - Website Fingerprinting Attack (WFA) which identifies websites browsed on Android devices is extremely dangerous because it creates an opportunity for stealing private information. As the most feasible WFA method, we focus on a method that can identify a website by using the power consumption model restored from CPU data. However, that is not effective in a real situation where multiple background tasks run because CPU data which are unrelated to browsing are confused. Furthermore, the previous method cannot accurately identify simple websites that are subject to background tasks. Thus, a more feasible method is required to indicate the dangers. In this paper, we propose a website fingerprinting attack based on virtual memory of process on Android device. We focus on the fact that a specific process about browsing websites works when a website is browsed. Because each process has its virtual memory which is independent of each other, the useful feature of a task can be extracted from the virtual memory without noise. Therefore, the proposed method can precisely identify a browsed website by using the virtual memory-based features even if background tasks work. Furthermore, the proposed method can obtain effective information even for a simple website. By computer simulation with a real dataset, we demonstrate that the proposed method can improve up to 86%, 89%, and 82% in precision, recall, and F-measure, respectively for websites which the previous scheme cannot identify at all.
KW - Android
KW - Machine Learning
KW - Website Fingerprinting
UR - http://www.scopus.com/inward/record.url?scp=85123498963&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85123498963&partnerID=8YFLogxK
U2 - 10.1109/APCC49754.2021.9609848
DO - 10.1109/APCC49754.2021.9609848
M3 - Conference contribution
AN - SCOPUS:85123498963
T3 - Proceeding - 2021 26th IEEE Asia-Pacific Conference on Communications, APCC 2021
SP - 7
EP - 12
BT - Proceeding - 2021 26th IEEE Asia-Pacific Conference on Communications, APCC 2021
A2 - Mansor, Mohd Fais
A2 - Ramli, Nordin
A2 - Ismail, Mahamod
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE Asia-Pacific Conference on Communications, APCC 2021
Y2 - 11 October 2021 through 13 October 2021
ER -