skip to main content
research-article

Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network

Published:30 June 2021Publication History
Skip Abstract Section

Abstract

With the recent advancement of smartphone technology in the past few years, smartphone usage has increased on a tremendous scale due to its portability and ability to perform many daily life tasks. As a result, smartphones have become one of the most valuable targets for hackers to perform cyberattacks, since the smartphone can contain individuals’ sensitive data. Smartphones are embedded with highly accurate sensors. This article proposes BetaLogger, an Android-based application that highlights the issue of leaking smartphone users’ privacy using smartphone hardware sensors (accelerometer, magnetometer, and gyroscope). BetaLogger efficiently infers the typed text (long or short) on a smartphone keyboard using Language Modeling and a Dense Multi-layer Neural Network (DMNN). BetaLogger is composed of two major phases: In the first phase, Text Inference Vector is given as input to the DMNN model to predict the target labels comprising the alphabet, and in the second phase, sequence generator module generate the output sequence in the shape of a continuous sentence. The outcomes demonstrate that BetaLogger generates highly accurate short and long sentences, and it effectively enhances the inference rate in comparison with conventional machine learning algorithms and state-of-the-art studies.

References

  1. Sara Afzal, Muhammad Asim, Abdul Rehman Javed, Mirza Omer Beg, and Thar Baker. 2021. URLdeepDetect: A deep learning approach for detecting malicious URLs using semantic vector models. J. Netw. Syst. Manage. 29, 3 (2021), 1–27.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mamoun Alazab, Suleman Khan, Somayaji Siva Rama Krishnan, Quoc-Viet Pham, M. Praveen Kumar Reddy, and Thippa Reddy Gadekallu. 2020. A multidirectional LSTM model for predicting the stability of a smart grid. IEEE Access 8 (2020), 85454–85463.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mamoun Alazab, Robert Layton, Roderic Broadhurst, and Brigitte Bouhours. 2013. Malicious spam emails developments and authorship attribution. In Proceedings of the 4th Cybercrime and Trustworthy Computing Workshop. IEEE, 58–68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Giuseppina Andresini, Annalisa Appice, and Donato Malerba. 2020. Dealing with class imbalance in android malware detection by cascading clustering and classification. In Complex Pattern Mining. Springer, Switzerland, 173–187.Google ScholarGoogle Scholar
  5. Muhammad Zubair Asghar, Fazli Subhan, Hussain Ahmad, Wazir Zada Khan, Saqib Hakak, Thippa Reddy Gadekallu, and Mamoun Alazab. 2021. Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction. Software: Pract. Exper. 51, 3 (2021), 571–594.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jianfeng Cui, Lixin Wang, Xin Zhao, and Hongyi Zhang. 2020. Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. Comput. Commun. 155 (2020), 125–131.Google ScholarGoogle ScholarCross RefCross Ref
  7. Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, and Jing Tian. 2020. Gait identification using a new time-warped similarity metric based on smartphone inertial signals. J. Ambient Intell. Human. Comput. 11, 10 (2020), 4041–4053.Google ScholarGoogle ScholarCross RefCross Ref
  8. Natarajan Deepa, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, Pubudu N. Pathirana et al. 2020. A survey on blockchain for big data: Approaches, opportunities, and future directions. Retrieved from https://arXiv:2009.00858.Google ScholarGoogle Scholar
  9. Sahibsingh A. Dudani. 1976. The distance-weighted k-nearest-neighbor rule. IEEE Trans. Syst. Man, Cybernet. SMC-6, 4 (1976), 325–327.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jerome H. Friedman. 2001. Greedy function approximation: A gradient boosting machine. Ann. Stat. 29, 5 (2001), 1189–1232.Google ScholarGoogle ScholarCross RefCross Ref
  11. Thippa Reddy Gadekallu, Dharmendra Singh Rajput, M. Praveen Kumar Reddy, Kuruva Lakshmanna, Sweta Bhattacharya, Saurabh Singh, Alireza Jolfaei, and Mamoun Alazab. 2020. A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU. J. Real-Time Image Process. 0, 0 (2020), 1–14.Google ScholarGoogle Scholar
  12. Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, and Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervas. Mobile Comput. 25 (2016), 1–25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, and Waleed S. Alnumay. 2021. DeepAMD: Detection and identification of android malware using high-efficient deep artificial neural network. Future Gen. Comput. Syst. 115 (2021), 844–856.Google ScholarGoogle ScholarCross RefCross Ref
  14. Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, and Ohyun Jo. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660.Google ScholarGoogle ScholarCross RefCross Ref
  15. Abdul Rehman Javed, Mirza Omer Beg, Muhammad Asim, Thar Baker, and Ali Hilal Al-Bayatti. 2020. AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient Intell. Human. Comput. 0, 0 (2020), 1–14.Google ScholarGoogle Scholar
  16. Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, and Mohammad Sayad Haghighi. 2020. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transport. Syst. 0, 0 (2020), 1–10.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jae Woong Joo, Seo Yeon Moon, Saurabh Singh, and Jong Hyuk Park. 2017. S-Detector: An enhanced security model for detecting smishing attack for mobile computing. Telecommun. Syst. 66, 1 (2017), 29–38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Krause, M. Ihmig, E. Rankin, D. Leong, Smriti Gupta, D. Siewiorek, A. Smailagic, M. Deisher, and U. Sengupta. 2005. Trading off prediction accuracy and power consumption for context-aware wearable computing. In Proceedings of the 9th IEEE International Symposium on Wearable Computers (ISWC’05). IEEE, 20–26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jennifer R. Kwapisz, Gary M. Weiss, and Samuel A. Moore. 2011. Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl. 12, 2 (Mar. 2011), 74–82. DOI:https://doi.org/10.1145/1964897.1964918 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kaijun Liu, Shengwei Xu, Guoai Xu, Miao Zhang, Dawei Sun, and Haifeng Liu. 2020. A review of android malware detection approaches based on machine learning. IEEE Access 8 (2020), 124579–124607.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ignacio Martín, José Alberto Hernández, and Sergio de los Santos. 2019. Machine-learning based analysis and classification of android malware signatures. Future Gen. Comput. Syst. 97 (2019), 295–305.Google ScholarGoogle ScholarCross RefCross Ref
  22. Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, and Malik Najmus Saqib. 2020. AdDroid: Rule-based machine learning framework for android malware analysis. Mobile Netw. Appl. 25, 1 (2020), 180–192.Google ScholarGoogle ScholarCross RefCross Ref
  23. Sparsh Mittal and Venkat Mattela. 2019. A survey of techniques for improving efficiency of mobile web browsing. Concurr. Comput.: Pract. Exper. 31, 15 (2019), e5126.Google ScholarGoogle ScholarCross RefCross Ref
  24. Long Nguyen-Vu, Jinung Ahn, and Souhwan Jung. 2019. Android fragmentation in malware detection. Comput. Secur. 87 (2019), 101573.Google ScholarGoogle ScholarCross RefCross Ref
  25. Rui Ning, Cong Wang, ChunSheng Xin, Jiang Li, and Hongyi Wu. 2018. Deepmag: Sniffing mobile apps in magnetic field through deep convolutional neural networks. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’18). IEEE, Athens, Greece, 1–10.Google ScholarGoogle ScholarCross RefCross Ref
  26. Dan Ping, Xin Sun, and Bing Mao. 2015. Textlogger: Inferring longer inputs on touch screen using motion sensors. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, New York, 1–12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Abdul Rehman, Saif Ur Rehman, Mohibullah Khan, Mamoun Alazab, and Thippa Reddy. 2021. CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 0, 0 (2021), 1–10.Google ScholarGoogle ScholarCross RefCross Ref
  28. Zhongru Ren, Haomin Wu, Qian Ning, Iftikhar Hussain, and Bingcai Chen. 2020. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 101 (2020), 102098.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, and Sanglu Lu. 2020. ClickGuard: Exposing hidden click fraud via mobile sensor side-channel analysis. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  30. Khoi-Nguyen Tran, Mamoun Alazab, Roderic Broadhurst et al. 2014. Towards a feature rich model for predicting spam emails containing malicious attachments and URLs. In ANU Research Publications. Australian Computer Society, Australia, 1–10.Google ScholarGoogle Scholar
  31. Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, and Ali Kashif Bashir. 2021. DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU). Future Gen. Comput. Syst. 118 (2021), 453–466.Google ScholarGoogle ScholarCross RefCross Ref
  32. R. Vinayakumar, Mamoun Alazab, Sriram Srinivasan, Quoc-Viet Pham, Soman Kotti Padannayil, and K. Simran. 2020. A visualized botnet detection system-based deep learning for the internet of things networks of smart cities. IEEE Trans. Industry Appl. 56, 4 (2020), 4436–4456.Google ScholarGoogle ScholarCross RefCross Ref
  33. Robert-Andrei Voicu, Ciprian Dobre, Lidia Bajenaru, and Radu-Ioan Ciobanu. 2019. Human physical activity recognition using smartphone sensors. Sensors 19, 3 (2019), 458.Google ScholarGoogle Scholar
  34. Suleiman Y. Yerima, Mohammed K. Alzaylaee, and Sakir Sezer. 2019. Machine learning-based dynamic analysis of android apps with improved code coverage. EURASIP J. Info. Secur. 2019, 1 (2019), 4.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!