Analyzing Android Encrypted Network Traffic to Identify User Actions

  title={Analyzing Android Encrypted Network Traffic to Identify User Actions},
  author={Mauro Conti and Luigi V. Mancini and Riccardo Spolaor and Nino Vincenzo Verde},
  journal={IEEE Transactions on Information Forensics and Security},
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling… CONTINUE READING
Highly Cited
This paper has 79 citations. REVIEW CITATIONS

From This Paper

Figures, tables, results, and topics from this paper.

Key Quantitative Results

  • We built a complete implementation of this system, and we also run a thorough set of experiments, which show that our attack can achieve accuracy and precision higher than 95%, for most of the considered actions.


Publications citing this paper.
Showing 1-10 of 43 extracted citations

Scrutinizing action performed by user on mobile app through network using machine learning techniques: A survey

2018 2nd International Conference on Inventive Systems and Control (ICISC) • 2018
View 3 Excerpts
Highly Influenced

Traffic Classification of Mobile Apps through Multi-Classification

GLOBECOM 2017 - 2017 IEEE Global Communications Conference • 2017
View 4 Excerpts
Highly Influenced

DELTA: Data Extraction and Logging Tool for Android

IEEE Transactions on Mobile Computing • 2018
View 2 Excerpts

Detecting Android Malware Leveraging Text Semantics of Network Flows

IEEE Transactions on Information Forensics and Security • 2018
View 1 Excerpt

79 Citations

Citations per Year
Semantic Scholar estimates that this publication has 79 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 38 references

Random Forests

Machine Learning • 2001
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…