{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T06:44:46Z","timestamp":1722753886645},"reference-count":36,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772383","U1836202","61572380","61702379","6141A02033341","JCYJ20170303170108208"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,17]]},"abstract":"Device fingerprinting technologies are widely employed in smartphones. However, the features used in existing schemes may bring the privacy disclosure problems because of their fixed and invariable nature (such as IMEI and OS version), or the draconian of their experimental conditions may lead to a large reduction in practicality. Finding a new, secure, and effective smartphone fingerprint is, however, a surprisingly challenging task due to the restrictions on technology and mobile phone manufacturers. To tackle this challenge, we propose a battery-based fingerprinting method, named PowerPrint, which captures the feature of power consumption rather than invariable information of the battery. Furthermore, power consumption information can be easily obtained without strict conditions. We design an unsupervised learning-based algorithm to fingerprint the battery, which is stimulated with different power consumption of tasks to improve the performance. We use 15 smartphones to evaluate the performance of PowerPrint in both laboratory and public conditions. The experimental results indicate that battery fingerprint can be efficiently used to identify smartphones with low overhead. At the same time, it will not bring privacy problems, since the power consumption information is changing in real time.<\/jats:p>","DOI":"10.1155\/2020\/3893106","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:36:00Z","timestamp":1605677760000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["PowerPrint: Identifying Smartphones through Power Consumption of the Battery"],"prefix":"10.1155","volume":"2020","author":[{"given":"Jiong","family":"Chen","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":true,"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"},{"name":"Science and Technology on Communication Security Laboratory, Chengdu, China"}]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Yingying","family":"Fang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"},{"name":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China"}]}],"member":"98","reference":[{"key":"1","first-page":"397","article-title":"Inferring user routes and locations using zero-permission mobile sensors","author":"S. Narain"},{"key":"2","first-page":"541","article-title":"Cookieless monster: exploring the ecosystem of web-based device fingerprinting","author":"N. Nikiforakis"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2871682"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2787905"},{"key":"5","first-page":"289","article-title":"Cookies that give you away: the surveillance implications of web tracking","author":"S. Englehardt"},{"key":"6","first-page":"878","article-title":"Beauty and the beast: diverting modern web browsers to build unique browser fingerprints","author":"P. Laperdrix"},{"key":"7","first-page":"1700","article-title":"Accurate and efficient wireless device fingerprinting using channel state information","author":"J. Hua"},{"key":"8","article-title":"Tracking mobile web users through motion sensors: attacks and defenses","author":"A. Das"},{"key":"9","article-title":"Charge-depleting of the batteries makes smartphones recognizable","author":"J. Chen"},{"key":"10","article-title":"7 leading fraud indicators: from fresh cookies to null values","author":"R. Pangam"},{"key":"11"},{"key":"12","first-page":"105","article-title":"Accurate online power estimation and automatic battery behavior based power model generation for smartphones","author":"L. Zhang"},{"key":"13","article-title":"An application that displays the power consumed by major system components","author":"M. Gordon"},{"key":"14","article-title":"Mirtoolbox","author":"O. Lartillot"},{"key":"15","article-title":"Feast","author":"A. Pocock"},{"key":"16","first-page":"27","article-title":"Conditional likelihood maximisation: a unifying framework for information theoretic feature selection","volume":"13","author":"G. Brown","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"18"},{"key":"19","first-page":"1129","article-title":"Fpdetective: dusting the web for fingerprinters","author":"G. Acar"},{"key":"20","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"T. Wang"},{"key":"21","first-page":"1382","article-title":"The clock is still ticking: timing attacks in the modern web","author":"T. van Goethem"},{"key":"22","first-page":"447","article-title":"Request and conquer: exposing cross-origin resource size","author":"T. van Goethem"},{"key":"23","first-page":"971","article-title":"Faulds: a non-parametric iterative classifier for internet-wide OS fingerprinting","author":"Z. Shamsi"},{"key":"24","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","author":"J. Franklin"},{"key":"25","first-page":"1469","article-title":"Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps","author":"C. Zuo"},{"key":"26","article-title":"(Cross-)browser fingerprinting via OS and hardware level features","author":"Y. Cao"},{"key":"27","article-title":"Accelprint: imperfections of accelerometers make smartphones trackable","author":"S. Dey"},{"key":"28","first-page":"638","article-title":"Sensorid: sensor calibration fingerprinting for smartphones","author":"J. Zhang"},{"key":"29","first-page":"441","article-title":"Do you hear what I hear?: fingerprinting smart devices through embedded acoustic components","author":"A. Das"},{"key":"30","first-page":"429","article-title":"Acoustic fingerprinting revisited: generate stable device ID stealthily with inaudible sound","author":"Z. Zhou"},{"key":"31","first-page":"211","article-title":"Remote physical device fingerprinting","author":"T. Kohno"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2013.26"},{"key":"33","first-page":"1502","article-title":"Clock around the clock: time-based device fingerprinting","author":"I. Sanchez-Rola"},{"key":"34","first-page":"1149","article-title":"Demicpu: device fingerprinting with magnetic signals radiated by cpu","author":"Y. Cheng"},{"key":"35","volume-title":"The Leaking Battery: A Privacy Analysis of the HTML5 Battery Status API","author":"L. Olejnik","year":"2015"},{"key":"36"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3893106.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3893106.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3893106.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:36:05Z","timestamp":1605677765000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/3893106\/"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":36,"alternative-id":["3893106","3893106"],"URL":"https:\/\/doi.org\/10.1155\/2020\/3893106","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,17]]}}}