Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound

The popularity of mobile device has made people's lives more convenient, but threatened people's privacy at the same time. As end users are becoming more and more concerned on the protection of their private information, it is even harder to track a specific user using conventional technol...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zhou, Zhe, Diao, Wenrui, Liu, Xiangyu, Zhang, Kehuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Zhou, Zhe
Diao, Wenrui
Liu, Xiangyu
Zhang, Kehuan
description The popularity of mobile device has made people's lives more convenient, but threatened people's privacy at the same time. As end users are becoming more and more concerned on the protection of their private information, it is even harder to track a specific user using conventional technologies. For example, cookies might be cleared by users regularly. Apple has stopped apps accessing UDIDs, and Android phones use some special permission to protect IMEI code. To address this challenge, some recent studies have worked on tracing smart phones using the hardware features resulted from the imperfect manufacturing process. These works have demonstrated that different devices can be differentiated to each other. However, it still has a long way to go in order to replace cookie and be deployed in real world scenarios, especially in terms of properties like uniqueness, robustness, etc. In this paper, we presented a novel method to generate stable and unique device ID stealthy for smartphones by exploiting the frequency response of the speaker. With carefully selected audio frequencies and special sound wave patterns, we can reduce the impacts of non-linear effects and noises, and keep our feature extraction process un-noticeable to users. The extracted feature is not only very stable for a given smart phone speaker, but also unique to that phone. The feature contains rich information that is equivalent to around 40 bits of entropy, which is enough to identify billions of different smart phones of the same model. We have built a prototype to evaluate our method, and the results show that the generated device ID can be used as a replacement of cookie.
doi_str_mv 10.48550/arxiv.1407.0803
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1407_0803</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1407_0803</sourcerecordid><originalsourceid>FETCH-LOGICAL-a653-7c0fd20b7e047d1a5737562155a535d22d19f5668854225adbd4a5020a5b11443</originalsourceid><addsrcrecordid>eNotj09Lw0AUxPfiQap3T7JfIHH_vWz0VlpbAwXB9tRLeMm-tAsxlc2m2m9vYj3NMDMM_Bh7kCI1OYB4wvDjz6k0wqYiF_qW7ef1aeijr_nKdwcKX8F3cXT8g86-95HcC19TRwEj8W3EqiW-HKuaeLEcA8I2Hi_828cjLzocnJ8W29PQuTt202Db0_2_zthu9bpbvCWb93WxmG8SzEAnthaNU6KyJIx1EsFqC5mSAAganFJOPjeQZXkORilAVzmDIJRAqKQ0Rs_Y4_X2j60cAT4xXMqJsZwY9S_b6Ete</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound</title><source>arXiv.org</source><creator>Zhou, Zhe ; Diao, Wenrui ; Liu, Xiangyu ; Zhang, Kehuan</creator><creatorcontrib>Zhou, Zhe ; Diao, Wenrui ; Liu, Xiangyu ; Zhang, Kehuan</creatorcontrib><description>The popularity of mobile device has made people's lives more convenient, but threatened people's privacy at the same time. As end users are becoming more and more concerned on the protection of their private information, it is even harder to track a specific user using conventional technologies. For example, cookies might be cleared by users regularly. Apple has stopped apps accessing UDIDs, and Android phones use some special permission to protect IMEI code. To address this challenge, some recent studies have worked on tracing smart phones using the hardware features resulted from the imperfect manufacturing process. These works have demonstrated that different devices can be differentiated to each other. However, it still has a long way to go in order to replace cookie and be deployed in real world scenarios, especially in terms of properties like uniqueness, robustness, etc. In this paper, we presented a novel method to generate stable and unique device ID stealthy for smartphones by exploiting the frequency response of the speaker. With carefully selected audio frequencies and special sound wave patterns, we can reduce the impacts of non-linear effects and noises, and keep our feature extraction process un-noticeable to users. The extracted feature is not only very stable for a given smart phone speaker, but also unique to that phone. The feature contains rich information that is equivalent to around 40 bits of entropy, which is enough to identify billions of different smart phones of the same model. We have built a prototype to evaluate our method, and the results show that the generated device ID can be used as a replacement of cookie.</description><identifier>DOI: 10.48550/arxiv.1407.0803</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2014-07</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1407.0803$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1407.0803$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Zhou, Zhe</creatorcontrib><creatorcontrib>Diao, Wenrui</creatorcontrib><creatorcontrib>Liu, Xiangyu</creatorcontrib><creatorcontrib>Zhang, Kehuan</creatorcontrib><title>Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound</title><description>The popularity of mobile device has made people's lives more convenient, but threatened people's privacy at the same time. As end users are becoming more and more concerned on the protection of their private information, it is even harder to track a specific user using conventional technologies. For example, cookies might be cleared by users regularly. Apple has stopped apps accessing UDIDs, and Android phones use some special permission to protect IMEI code. To address this challenge, some recent studies have worked on tracing smart phones using the hardware features resulted from the imperfect manufacturing process. These works have demonstrated that different devices can be differentiated to each other. However, it still has a long way to go in order to replace cookie and be deployed in real world scenarios, especially in terms of properties like uniqueness, robustness, etc. In this paper, we presented a novel method to generate stable and unique device ID stealthy for smartphones by exploiting the frequency response of the speaker. With carefully selected audio frequencies and special sound wave patterns, we can reduce the impacts of non-linear effects and noises, and keep our feature extraction process un-noticeable to users. The extracted feature is not only very stable for a given smart phone speaker, but also unique to that phone. The feature contains rich information that is equivalent to around 40 bits of entropy, which is enough to identify billions of different smart phones of the same model. We have built a prototype to evaluate our method, and the results show that the generated device ID can be used as a replacement of cookie.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj09Lw0AUxPfiQap3T7JfIHH_vWz0VlpbAwXB9tRLeMm-tAsxlc2m2m9vYj3NMDMM_Bh7kCI1OYB4wvDjz6k0wqYiF_qW7ef1aeijr_nKdwcKX8F3cXT8g86-95HcC19TRwEj8W3EqiW-HKuaeLEcA8I2Hi_828cjLzocnJ8W29PQuTt202Db0_2_zthu9bpbvCWb93WxmG8SzEAnthaNU6KyJIx1EsFqC5mSAAganFJOPjeQZXkORilAVzmDIJRAqKQ0Rs_Y4_X2j60cAT4xXMqJsZwY9S_b6Ete</recordid><startdate>20140703</startdate><enddate>20140703</enddate><creator>Zhou, Zhe</creator><creator>Diao, Wenrui</creator><creator>Liu, Xiangyu</creator><creator>Zhang, Kehuan</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20140703</creationdate><title>Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound</title><author>Zhou, Zhe ; Diao, Wenrui ; Liu, Xiangyu ; Zhang, Kehuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a653-7c0fd20b7e047d1a5737562155a535d22d19f5668854225adbd4a5020a5b11443</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhou, Zhe</creatorcontrib><creatorcontrib>Diao, Wenrui</creatorcontrib><creatorcontrib>Liu, Xiangyu</creatorcontrib><creatorcontrib>Zhang, Kehuan</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhou, Zhe</au><au>Diao, Wenrui</au><au>Liu, Xiangyu</au><au>Zhang, Kehuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound</atitle><date>2014-07-03</date><risdate>2014</risdate><abstract>The popularity of mobile device has made people's lives more convenient, but threatened people's privacy at the same time. As end users are becoming more and more concerned on the protection of their private information, it is even harder to track a specific user using conventional technologies. For example, cookies might be cleared by users regularly. Apple has stopped apps accessing UDIDs, and Android phones use some special permission to protect IMEI code. To address this challenge, some recent studies have worked on tracing smart phones using the hardware features resulted from the imperfect manufacturing process. These works have demonstrated that different devices can be differentiated to each other. However, it still has a long way to go in order to replace cookie and be deployed in real world scenarios, especially in terms of properties like uniqueness, robustness, etc. In this paper, we presented a novel method to generate stable and unique device ID stealthy for smartphones by exploiting the frequency response of the speaker. With carefully selected audio frequencies and special sound wave patterns, we can reduce the impacts of non-linear effects and noises, and keep our feature extraction process un-noticeable to users. The extracted feature is not only very stable for a given smart phone speaker, but also unique to that phone. The feature contains rich information that is equivalent to around 40 bits of entropy, which is enough to identify billions of different smart phones of the same model. We have built a prototype to evaluate our method, and the results show that the generated device ID can be used as a replacement of cookie.</abstract><doi>10.48550/arxiv.1407.0803</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1407.0803
ispartof
issn
language eng
recordid cdi_arxiv_primary_1407_0803
source arXiv.org
subjects Computer Science - Cryptography and Security
title Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T05%3A15%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Acoustic%20Fingerprinting%20Revisited:%20Generate%20Stable%20Device%20ID%20Stealthy%20with%20Inaudible%20Sound&rft.au=Zhou,%20Zhe&rft.date=2014-07-03&rft_id=info:doi/10.48550/arxiv.1407.0803&rft_dat=%3Carxiv_GOX%3E1407_0803%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true