Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules

2022 ◽  
Vol 18 (2) ◽  
pp. 1-28
Author(s):  
Xiaoyu Ji ◽  
Yushi Cheng ◽  
Juchuan Zhang ◽  
Yuehan Chi ◽  
Wenyuan Xu ◽  
...  

With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally measured device fingerprints, such as device ID, software or hardware-based characteristics. In this article, we propose DeMiCPU , a stimulation-response-based device fingerprinting technique that relies on externally measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power-supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.7% precision and recall on average, and 99.8% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6~s. The performance can be further improved to 99.9% with multi-round fingerprinting. In addition, we implement a prototype of DeMiCPU docker, which can effectively reduce the requirement of test points and enlarge the fingerprinting area.

2018 ◽  
Vol 8 (3) ◽  
pp. 124-128
Author(s):  
Nadide Duygu Solak ◽  
Murat Topaloglu

The number of mobile applications has been increasing rapidly in every field of life with the increasing use of smart devices. Smartphones and tablets make our lives easier with their properties and application they include. Minor or major accidents in traffic are always present in the daily life resulting in financial damage and loss of lives. There have been a number of studies done to speed up the processes to be done from the moment an accident happens. This study aims to enable people to perform all of the post-accident processes quickly and accurately with the use of mobile devices. In this way, papers and documents like photographs will be sent to the competent authorities without wasting time and effort. In addition, access to the road assistance needed will be quite easy. Keywords: Traffic accident, loss assessment and proceedings, mobile application.


Author(s):  
Ewa Janczukowicz ◽  
Ahmed Bouabdallah ◽  
Arnaud Braud ◽  
Stéphane Tuffin ◽  
Jean-Marie Bonnin

Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and furthermore, it wants to redefine the way payments work for mobile applications. Firefox OS is not directly competing with Android and iOS, although it has some common target markets with Android. It could be an opportunity to weaken the iOS and Android duopoly. For now it targets users that don't have smartphones yet and is mostly used on low-end devices. The biggest challenge of Firefox OS is to assure a stable position in the mobile OS ecosystem and to get a large volume of users. Mozilla has an ambition to improve the web and make the web the platform. However developing the Firefox OS and ensuring its important place on the market is difficult because of technological and business limits that will be discussed in this chapter.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3098 ◽  
Author(s):  
Luis Augusto Silva ◽  
Valderi Reis Quietinho Leithardt ◽  
Carlos O. Rolim ◽  
Gabriel Villarrubia González ◽  
Cláudio F. R. Geyer ◽  
...  

With the growing number of mobile devices receiving daily notifications, it is necessary to manage the variety of information produced. New smart devices are developed every day with the ability to generate, send, and display messages about their status, data, and information about other devices. Consequently, the number of notifications received by a user is increasing and their tolerance may decrease in a short time. With this, it is necessary to develop a management system and notification controls. In this context, this work proposes a notification and alert management system called PRISER. Its focus is on user profiles and environments, applying data privacy criteria.


Author(s):  
Arjun Roy ◽  
Stephen M. Rumble ◽  
Ryan Stutsman ◽  
Philip Levis ◽  
David Mazières ◽  
...  

2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.


2015 ◽  
Vol 2015 ◽  
pp. 1-23 ◽  
Author(s):  
Chi-Yo Huang ◽  
Yu-Sheng Kao

The smart mobile devices have emerged during the past decade and have become one of the most dominant consumer electronic products. Therefore, exploring and understanding the factors which can influence the acceptance of novel mobile technology have become the essential task for the vendors and distributors of mobile devices. The Phablets, integrated smart devices combining the functionality and characteristics of both tablet PCs and smart phones, have gradually become possible alternatives for smart phones. Therefore, predicting factors which can influence the acceptance of Phablets have become indispensable for designing, manufacturing, and marketing of such mobile devices. However, such predictions are not easy. Meanwhile, very few researches tried to study related issues. Consequently, the authors aim to explore and predict the intentions to use and use behaviors of Phablets. The second generation of the Unified Theory of Acceptance and Use of Technology (UTAUT2) is introduced as a theoretic basis. The Decision Making Trial and Evaluation Laboratory (DEMATEL) based Network Process (DNP) will be used to construct the analytic framework. In light of the analytic results, the causal relationships being derived by the DEMATEL demonstrate the direct influence of the habit on other dimensions. Also, based on the influence weights being derived, the use intention, hedonic motivation, and performance expectancy are the most important dimensions. The analytic results can serve as a basis for concept developments, marketing strategy definitions, and new product designs of the future Phablets. The proposed analytic framework can also be used for predicting and analyzing consumers’ preferences toward future mobile devices.


2017 ◽  
Vol 5 ◽  
pp. 193-199
Author(s):  
Mateusz Dobrowolski ◽  
Michał Dobrowolski ◽  
Piotr Kopniak

This publication concentrate on the posibility of the use of sensors in mobile devices with modified operating systems. Presented research focuses on Android devices. The gyroscope, the accelerometer, the orientation sensor and the light sensor data was acquired with use of Physics Toolbox Sensor software. The research has been conducted on two mobile devices of Xiaomi under control of six different kinds of operating system. Measured values were compared to values recorded by very accurate, reference sensors


Compiler ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Moh Risaldi ◽  
Astika Ayuningtyas

Userman is a tool in mikrotic that serves as a network user. Userman's tools are only accessible by admin and can only be accessed via a computer device. Utilization of handheld or mobile phone device at this time the usual thing because cellular phone or handphone is as companion in carrying out everyday activities. That's what makes Hanphone is very commonplace for some people. This is because some Mobile already has the function and ability more than just the basic function. Android as an operating system that can be embedded in mobile devices have the ability to be installed applications required by the user. In this final project, the mikrotik application can be used to manage the admin that has been in the menu of user management and mikrotik application can also be successful to monitor network traffic and limit the bandwidth to the connected user.


Sign in / Sign up

Export Citation Format

Share Document