With the widespread use of smart devices, device authentication has received much attention. One popular method for device authentication is to utilize internally-measured device fingerprints, such as device ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based device fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from the CPU module that consists of the CPU chip and its affiliated power supply circuits. The key insight of DeMiCPU is that hardware discrepancies essentially exist among CPU modules and thus the corresponding MI signals make promising device fingerprints, which are difficult to be modified or mimicked. We design a stimulation and a discrepancy extraction scheme and evaluate them with 90 mobile devices, including 70 laptops (among which 30 are of totally identical CPU and operating system) and 20 smartphones. The results show that DeMiCPU can achieve 99.1% precision and recall on average, and 98.6% precision and recall for the 30 identical devices, with a fingerprinting time of 0.6 s. In addition, the performance can be further improved to 99.9% with multi-round fingerprinting.
DeMiCPU is a device fingerprinting scheme consisting of a trusted DeMiCPU server, a stimulation program on the target device, and a trusted stand-alone DeMiCPU capturing module with a built-in magnetic sensor as shown in the Figure, and it works as follows. Once an application requests for device fingerprinting, DeMiCPU starts the stimulation program, and the DeMiCPU sensor measures and packages the measurements with protection and uploads the packaged measurements to the DeMiCPU server for fingerprint matching.
The following devices have been tested in our experiments with the experimental parameters provided in our paper. This table shows all experimental devices and their detailed specifications. A total of 90 devices are used, including 70 laptops and 20 smartphones. Among them, 1-30, 31-33, 50-51, 84-85 and 88-89 are of the same model and OS respectively.
No. | Manufacturer | Model | OS | CPU Model | Test Point |
---|---|---|---|---|---|
1-30 | Lenovo | ThinkPad T430 | Win 7 | i5-3320M | S |
31-33 | Lenovo | ThinkPad T440p | Win 7 | i5-4210M | S |
34 | Lenovo | G480 | Win 7 | i5-3210M | R |
35 | Lenovo | G480 | Win 10 | i5-3210M | R |
36 | Lenovo | ThinkPad X201 | Win 10 | i5-540M | F6 |
37 | Lenovo | ThinkPad T440 | Debian | i7-4500U | N |
38 | Lenovo | ThinkPad W520 | GNOME | i7-2760QM | E |
39 | Lenovo | ThinkPad Edge E431 | Win 10 | i7-3632QM | S |
40 | Lenovo | ThinkPad Edge E530 | Win 10 | i5-3210M | S |
41 | Lenovo | IdeaPad Y470 | Win 7 | i5-2450M | E |
42 | Lenovo | IdeaPad Y485 | Win 7 | A8-4500M | F5 |
43 | Lenovo | Yoga2 13 | Win 10 | i5-4210U | F4 |
44 | Lenovo | Yoga 710 | Win 10 | i5-6200U | O |
45 | Lenovo | U430P | Win 10 | i5-4200U | F1 |
46 | Lenovo | Erazer Z410 | Win 10 | i7-4702MQ | 6 |
47 | Lenovo | E47a | Win 7 | i5-2520M | S |
48 | Lenovo | X200 7455 | GNOME | Intel P8600 | F |
49 | Lenovo | R720 | Win 10 | i5-7300HQ | 7 |
50-51 | Apple | MacBook Air A1466 | OS x | i5-4260U | W&E |
52 | Apple | MacBook Pro A1707 | OS x | i7-6920HQ | W&E |
53 | Apple | MacBook Pro A1502 | OS x | i5-4278U | C |
54 | Dell | Inspiron N4050 | Win 7 | i3-2350M | F |
55 | Dell | Inspiron N5110 | Win 7 | i5-2450M | F |
56 | Dell | Inspiron 14 7460 | Win 10 | i5-7200U | 6 |
57 | Dell | Inspiron 15R 5520 | Win 10 | i5-3210M | Fn |
58 | Dell | Inspiron 15 7559 | Win 10 | i5-6300HQ | F6 |
59 | Dell | Latitude E4300 | Win XP | Intel SP9400 | F |
60 | Dell | Latitude E7440 | Win 10 | i5-4200U | E&R |
61 | Dell | XPS13 | Win 10 | i5-3317U | 6 |
62 | Dell | XPS14 L421X | Win 10 | i7-3537U | 4 |
63 | Asus | Eee PC 1201HA | Win 7 | Intel Z520 | A |
64 | Asus | N46V | Win 8.1 | i5-3210M | B&N |
65 | Asus | X450EI323VC-SL | Win 10 | i5-3230M | F |
66 | Acer | V5-471G | Win 7 | i5-3337U | D |
67 | HP | TPN-Q173 | Win 10 | i5-6300HQ | Backspace |
68 | MSI | MS16-H8 | Win 10 | i7-6700HQ | Scroll Lock |
69 | Sony | SVT131A11T | Win 7 | i5-3317U | X |
70 | Sony | SVT131A11T | Win 10 | i5-3317U | X |
71 | Mi | 5 | Android 6.0 | Snapdragon 820 | BVK1 |
72 | Mi | 5S | Android 6.0 | Snapdragon 820 | BVK1 |
73 | Huawei | Honor 5X | Android 5.1 | Snapdragon 616 | BVK1 |
74 | Huawei | Honor 8 | Android 6.0 | Kirin 950 | BVK1 |
75 | Huawei | Honor V8 | Android 6.0 | Kirin 950 | BVK1 |
76 | Huawei | P9 | Android 6.0 | Kirin 955 | BVK1 |
77 | LG | Nexus 5 | Android 4.4 | Snapdragon 800 | BVK1 |
78 | LG | Nexus 5X | Android 6.0 | Snapdragon 808 | BVK1 |
79 | Vivo | X7 | Android 5.1 | Snapdragon 652 | BVK1 |
80 | Samsung | Galaxy S6 | Android 5.0 | Exynos 7420 | BVK1 |
81 | Apple | iPhone 6 | iOS 10.2.1 | Apple A8 | BPK2 |
82 | Apple | iPhone 6 | iOS 11.0.3 | Apple A8 | BPK2 |
83 | Apple | iPhone 6 Plus | iOS 11.1.1 | Apple A8 | BPK2 |
84-85 | Apple | iPhone 6s | iOS 10.3.3 | Apple A9 | BPK2 |
86 | Apple | iPhone 6s | iOS 10.2.1 | Apple A9 | BPK2 |
87 | Apple | iPhone 6s | iOS 11.2.1 | Apple A9 | BPK2 |
88-89 | Apple | iPhone SE | iOS 11.2.1 | Apple A9 | BPK2 |
90 | Apple | iPhone 7 Plus | iOS 10.3.3 | Apple A10 | BPK2 |
1 BVK = Beside Volume Key
2 BPK = Beside Power Key
As shown in the following figure, we collect MI signals emitted from the CPU models with a magnetic-field sensor DRV425 from Texas Instruments (TI), and conduct AD conversion with a data acquisition (DAQ) card U2541A from Keysight at a sampling rate of 200 kHz.
Yushi Cheng, Xiaoyu Ji*, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.(CCS2019) , November, 2019.[pdf]
* Corresponding Author
@inproceedings{cheng2019demicpu,
title={Demicpu: Device fingerprinting with magnetic signals radiated by cpu},
author={Cheng, Yushi and Ji, Xiaoyu and Zhang, Juchuan and Xu, Wenyuan and Chen, Yi-Chao},
booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages={1149--1170},
year={2019}
}
- Prof. Wenyuan Xu (wyxu@zju.edu.cn)
- Prof. Xiaoyu Ji (xji@zju.edu.cn)
- Dr. Yushi Cheng (yushicheng@zju.edu.cn)
Ubiquitous System Security Laboratory (USSLab) | Zhejiang University | ||