Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

19 Scopus Citations
View graph of relations

Author(s)

Detail(s)

Original languageEnglish
Title of host publicationProceedings of the 32nd USENIX Security Symposium
PublisherUSENIX Association
Pages3511-3528
Number of pages18
ISBN (electronic)9781939133373
ISBN (print)9781713879497
Publication statusPublished - Aug 2023

Publication series

NameUSENIX Security Symposium, USENIX Security

Conference

Title32nd USENIX Security Symposium (USENIX Security '23)
LocationAnaheim Marriott
PlaceUnited States
CityAnaheim
Period9 - 11 August 2023

Abstract

Radio-frequency (RF) energy harvesting is a promising technology for Internet-of-Things (IoT) devices to power sensors and prolong battery life. In this paper, we present a novel side-channel attack that leverages RF energy harvesting signals to eavesdrop mobile app activities. To demonstrate this novel attack, we propose AppListener, an automated attack framework that recognizes fine-grained mobile app activities from harvested RF energy. The RF energy is harvested from a custom-built RF energy harvester which generates voltage signals from ambient Wi-Fi transmissions, and app activities are recognized from a three-tier classification algorithm. We evaluate AppListener with four mobile devices running 40 common mobile apps (e.g., YouTube, Facebook, and WhatsApp) belonging to five categories (i.e., video, music, social media, communication, and game); each category contains five application-specific activities. Experiment results show that AppListener achieves over 99% accuracy in differentiating four different mobile devices, over 98% accuracy in classifying 40 different apps, and 86.7% accuracy in recognizing five sets of application-specific activities. Moreover, a comprehensive study is conducted to show AppListener is robust to a number of impact factors, such as distance, environment, and non-target connected devices. Practices of integrating AppListener into commercial IoT devices also demonstrate that it is easy to deploy. Finally, countermeasures are presented as the first step to defend against this novel attack. © 2023 by The USENIX Association.

Research Area(s)

  • energy harvesting, eavesdropping attack, mobile app

Bibliographic Note

Information for this record is supplemented by the author(s) concerned.

Citation Format(s)

Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. / Ni, Tao; Lan, Guohao; Wang, Jia et al.
Proceedings of the 32nd USENIX Security Symposium. USENIX Association, 2023. p. 3511-3528 (USENIX Security Symposium, USENIX Security).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review