Abstract
With the recent advancement of smartphone technology in the past few years, smartphone usage has increased on a tremendous scale due to its portability and ability to perform many daily life tasks. As a result, smartphones have become one of the most valuable targets for hackers to perform cyberattacks, since the smartphone can contain individuals’ sensitive data. Smartphones are embedded with highly accurate sensors. This article proposes BetaLogger, an Android-based application that highlights the issue of leaking smartphone users’ privacy using smartphone hardware sensors (accelerometer, magnetometer, and gyroscope). BetaLogger efficiently infers the typed text (long or short) on a smartphone keyboard using Language Modeling and a Dense Multi-layer Neural Network (DMNN). BetaLogger is composed of two major phases: In the first phase, Text Inference Vector is given as input to the DMNN model to predict the target labels comprising the alphabet, and in the second phase, sequence generator module generate the output sequence in the shape of a continuous sentence. The outcomes demonstrate that BetaLogger generates highly accurate short and long sentences, and it effectively enhances the inference rate in comparison with conventional machine learning algorithms and state-of-the-art studies.
- Sara Afzal, Muhammad Asim, Abdul Rehman Javed, Mirza Omer Beg, and Thar Baker. 2021. URLdeepDetect: A deep learning approach for detecting malicious URLs using semantic vector models. J. Netw. Syst. Manage. 29, 3 (2021), 1–27.Google Scholar
Cross Ref
- Mamoun Alazab, Suleman Khan, Somayaji Siva Rama Krishnan, Quoc-Viet Pham, M. Praveen Kumar Reddy, and Thippa Reddy Gadekallu. 2020. A multidirectional LSTM model for predicting the stability of a smart grid. IEEE Access 8 (2020), 85454–85463.Google Scholar
Cross Ref
- Mamoun Alazab, Robert Layton, Roderic Broadhurst, and Brigitte Bouhours. 2013. Malicious spam emails developments and authorship attribution. In Proceedings of the 4th Cybercrime and Trustworthy Computing Workshop. IEEE, 58–68. Google Scholar
Digital Library
- Giuseppina Andresini, Annalisa Appice, and Donato Malerba. 2020. Dealing with class imbalance in android malware detection by cascading clustering and classification. In Complex Pattern Mining. Springer, Switzerland, 173–187.Google Scholar
- Muhammad Zubair Asghar, Fazli Subhan, Hussain Ahmad, Wazir Zada Khan, Saqib Hakak, Thippa Reddy Gadekallu, and Mamoun Alazab. 2021. Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction. Software: Pract. Exper. 51, 3 (2021), 571–594.Google Scholar
Cross Ref
- Jianfeng Cui, Lixin Wang, Xin Zhao, and Hongyi Zhang. 2020. Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. Comput. Commun. 155 (2020), 125–131.Google Scholar
Cross Ref
- Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, and Jing Tian. 2020. Gait identification using a new time-warped similarity metric based on smartphone inertial signals. J. Ambient Intell. Human. Comput. 11, 10 (2020), 4041–4053.Google Scholar
Cross Ref
- Natarajan Deepa, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, Pubudu N. Pathirana et al. 2020. A survey on blockchain for big data: Approaches, opportunities, and future directions. Retrieved from https://arXiv:2009.00858.Google Scholar
- Sahibsingh A. Dudani. 1976. The distance-weighted k-nearest-neighbor rule. IEEE Trans. Syst. Man, Cybernet. SMC-6, 4 (1976), 325–327.Google Scholar
Cross Ref
- Jerome H. Friedman. 2001. Greedy function approximation: A gradient boosting machine. Ann. Stat. 29, 5 (2001), 1189–1232.Google Scholar
Cross Ref
- Thippa Reddy Gadekallu, Dharmendra Singh Rajput, M. Praveen Kumar Reddy, Kuruva Lakshmanna, Sweta Bhattacharya, Saurabh Singh, Alireza Jolfaei, and Mamoun Alazab. 2020. A novel PCA–whale optimization-based deep neural network model for classification of tomato plant diseases using GPU. J. Real-Time Image Process. 0, 0 (2020), 1–14.Google Scholar
- Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, and Mohamed Abdulnabi. 2016. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervas. Mobile Comput. 25 (2016), 1–25. Google Scholar
Digital Library
- Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, and Waleed S. Alnumay. 2021. DeepAMD: Detection and identification of android malware using high-efficient deep artificial neural network. Future Gen. Comput. Syst. 115 (2021), 844–856.Google Scholar
Cross Ref
- Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, and Ohyun Jo. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660.Google Scholar
Cross Ref
- Abdul Rehman Javed, Mirza Omer Beg, Muhammad Asim, Thar Baker, and Ali Hilal Al-Bayatti. 2020. AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient Intell. Human. Comput. 0, 0 (2020), 1–14.Google Scholar
- Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, and Mohammad Sayad Haghighi. 2020. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transport. Syst. 0, 0 (2020), 1–10.Google Scholar
Cross Ref
- Jae Woong Joo, Seo Yeon Moon, Saurabh Singh, and Jong Hyuk Park. 2017. S-Detector: An enhanced security model for detecting smishing attack for mobile computing. Telecommun. Syst. 66, 1 (2017), 29–38. Google Scholar
Digital Library
- A. Krause, M. Ihmig, E. Rankin, D. Leong, Smriti Gupta, D. Siewiorek, A. Smailagic, M. Deisher, and U. Sengupta. 2005. Trading off prediction accuracy and power consumption for context-aware wearable computing. In Proceedings of the 9th IEEE International Symposium on Wearable Computers (ISWC’05). IEEE, 20–26. Google Scholar
Digital Library
- Jennifer R. Kwapisz, Gary M. Weiss, and Samuel A. Moore. 2011. Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl. 12, 2 (Mar. 2011), 74–82. DOI:https://doi.org/10.1145/1964897.1964918 Google Scholar
Digital Library
- Kaijun Liu, Shengwei Xu, Guoai Xu, Miao Zhang, Dawei Sun, and Haifeng Liu. 2020. A review of android malware detection approaches based on machine learning. IEEE Access 8 (2020), 124579–124607.Google Scholar
Cross Ref
- Ignacio Martín, José Alberto Hernández, and Sergio de los Santos. 2019. Machine-learning based analysis and classification of android malware signatures. Future Gen. Comput. Syst. 97 (2019), 295–305.Google Scholar
Cross Ref
- Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, and Malik Najmus Saqib. 2020. AdDroid: Rule-based machine learning framework for android malware analysis. Mobile Netw. Appl. 25, 1 (2020), 180–192.Google Scholar
Cross Ref
- Sparsh Mittal and Venkat Mattela. 2019. A survey of techniques for improving efficiency of mobile web browsing. Concurr. Comput.: Pract. Exper. 31, 15 (2019), e5126.Google Scholar
Cross Ref
- Long Nguyen-Vu, Jinung Ahn, and Souhwan Jung. 2019. Android fragmentation in malware detection. Comput. Secur. 87 (2019), 101573.Google Scholar
Cross Ref
- Rui Ning, Cong Wang, ChunSheng Xin, Jiang Li, and Hongyi Wu. 2018. Deepmag: Sniffing mobile apps in magnetic field through deep convolutional neural networks. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’18). IEEE, Athens, Greece, 1–10.Google Scholar
Cross Ref
- Dan Ping, Xin Sun, and Bing Mao. 2015. Textlogger: Inferring longer inputs on touch screen using motion sensors. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, New York, 1–12. Google Scholar
Digital Library
- Abdul Rehman, Saif Ur Rehman, Mohibullah Khan, Mamoun Alazab, and Thippa Reddy. 2021. CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 0, 0 (2021), 1–10.Google Scholar
Cross Ref
- Zhongru Ren, Haomin Wu, Qian Ning, Iftikhar Hussain, and Bingcai Chen. 2020. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 101 (2020), 102098.Google Scholar
Digital Library
- Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, and Sanglu Lu. 2020. ClickGuard: Exposing hidden click fraud via mobile sensor side-channel analysis. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1–6.Google Scholar
Cross Ref
- Khoi-Nguyen Tran, Mamoun Alazab, Roderic Broadhurst et al. 2014. Towards a feature rich model for predicting spam emails containing malicious attachments and URLs. In ANU Research Publications. Australian Computer Society, Australia, 1–10.Google Scholar
- Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, and Ali Kashif Bashir. 2021. DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU). Future Gen. Comput. Syst. 118 (2021), 453–466.Google Scholar
Cross Ref
- R. Vinayakumar, Mamoun Alazab, Sriram Srinivasan, Quoc-Viet Pham, Soman Kotti Padannayil, and K. Simran. 2020. A visualized botnet detection system-based deep learning for the internet of things networks of smart cities. IEEE Trans. Industry Appl. 56, 4 (2020), 4436–4456.Google Scholar
Cross Ref
- Robert-Andrei Voicu, Ciprian Dobre, Lidia Bajenaru, and Radu-Ioan Ciobanu. 2019. Human physical activity recognition using smartphone sensors. Sensors 19, 3 (2019), 458.Google Scholar
- Suleiman Y. Yerima, Mohammed K. Alzaylaee, and Sakir Sezer. 2019. Machine learning-based dynamic analysis of android apps with improved code coverage. EURASIP J. Info. Secur. 2019, 1 (2019), 4.Google Scholar
Cross Ref
Index Terms
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network
Recommendations
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Towards a Smartphone User Competency Evolution Model
SAICSIT '15: Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information TechnologistsOver the past few years smartphones have evolved from being basic devices that support stock-standard, static Operating Systems (OSs) to powerful devices that are capable of running dynamic, customizable OSs. In turn, these OSs also support the ...
Informer: Protecting Intel SGX from Cross-Core Side Channel Threats
Information and Communications SecurityAbstractAs one of the major threats facing Intel SGX, side-channel attacks have been widely researched and disclosed as actual vulnerabilities in recent years, which can severely harm the integrity and confidentiality of programs protected by SGX. Most ...






Comments