Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks

Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

SMS-timing-based location inference attacks leverage timing side channels to ascertain a target’s location. Prior work has primarily relied on a single-sender approach, employing only one SMS attacker from a specific location to infer the victim’s whereabouts. However, this method exhibits several drawbacks. In this research, we systematically enumerate the limitations of the single-sender approach, which prompted us to explore a multi-sender strategy. Our investigation delves into the feasibility of an attacker employing multiple SMS senders towards a victim to address these limitations and introduces novel features to bolster prediction accuracy. Through exhaustive experimentation, we demonstrate that strategically positioned multiple SMS senders significantly enhance the location-inference accuracy, achieving a 142% improvement for four distinct classes of potential victim locations. This work further highlights the need to develop mitigations against SMStiming-based location inference attacks.

Original languageEnglish (US)
Title of host publicationProceedings of the 18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
PublisherUSENIX Association
Pages59-73
Number of pages15
ISBN (Electronic)9781939133434
StatePublished - 2024
Event18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024 - Philadelphia, United States
Duration: Aug 12 2024Aug 13 2024

Publication series

NameProceedings of the 18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024

Conference

Conference18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
Country/TerritoryUnited States
CityPhiladelphia
Period8/12/248/13/24

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks'. Together they form a unique fingerprint.

Cite this