
tion with randomly varying parameters across RT T
measurements. Through experimental validation, we
highlighted the effectiveness of our proposed solution
compared to the existing one.
However, we could not use the original dataset due
to privacy restrictions. Our illustrative dataset com-
prises RT T s derived from ping reply timings to con-
struct a POC of the attack. Therefore, the obtained
results may vary slightly if we were to use data based
on RT T s from messenger notifications or SMS deliv-
ery reports. Furthermore, our study has limitations
in the exploration of machine learning algorithms, as
we solely opted for an LST M model to demonstrate
the feasibility of the attack. Additionally, we only
focused on two locations in our work to construct a
Proof of Concept of the attack. As a future work, we
aspire to investigate the potential existence of timing
side-channel vulnerabilities in video and voice calls.
REFERENCES
Ahmed, A. A., Hasan, M. K., Aman, A. H., Safie, N., Islam,
S., Ahmed, F. R. A., and Rzayeva, L. (2024). Review
on hybrid deep learning models for enhancing encryp-
tion techniques against side channel attacks. IEEE Ac-
cess.
Ariano, R. (2020). ’what do the check marks mean on what-
sapp?’: How to determine the status of your message
on whatsapp. Accessed March 12, 2024.
Bateman, R. (2023). Privacy practices for user
location. https://www.termsfeed.com/blog/
user-location-privacy-practices/, as of April 2024.
Bitsikas, E., Schnitzler, T., P
¨
opper, C., and Ranganathan, A.
(2023). Freaky leaky sms: Extracting user locations
by analyzing sms timings. In 32nd USENIX Security
Symposium (USENIX Security 23), pages 2151–2168.
Bognar, M., Winderix, H., Bulck, J. V., and Piessens, F.
(2023). Microprofiler: Principled side-channel miti-
gation through microarchitectural profiling. In 2023
IEEE 8th European Symposium on Security and Pri-
vacy (EuroS&P), pages 651–670. IEEE.
Candela, M., Gregori, E., Luconi, V., and Vecchio, A.
(2019). Using ripe atlas for geolocating ip infrastruc-
ture. IEEE Access, 7:48816–48829.
Diamantaris, M., Moustakas, S., Sun, L., Ioannidis, S., and
Polakis, J. (2021). This sneaky piggy went to the an-
droid ad market: Misusing mobile sensors for stealthy
data exfiltration. In Proceedings of the 2021 ACM
SIGSAC Conference on Computer and Communica-
tions Security (CCS), pages 1065–1081.
Du, B., Candela, M., Huffaker, B., Snoeren, A. C., and
claffy, k. (2020). Ripe ipmap active geolocation:
Mechanism and performance evaluation. ACM SIG-
COMM Computer Communication Review, 50(1):4–
10.
Erata, F., Piskac, R., Mateu, V., and Szefer, J. (2023).
Towards automated detection of single-trace side-
channel vulnerabilities in constant-time cryptographic
code. In 2023 IEEE 8th European Symposium on Se-
curity and Privacy (EuroS&P), pages 687–706. IEEE.
Erni, S., Leu, P., Kotuliak, M., R
¨
oschlin, M., and Capkun,
S. (2021). Adaptover: Adaptive overshadowing of lte
signals. ArXiv, abs/2106.05039.
Fawaz, K. and Shin, K. G. (2014). Location privacy protec-
tion for smartphone users. In Proceedings of the 2014
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 239–250.
Han, X. et al. (2022). Location heartbleeding: The rise of
wi-fi spoofing attack via geolocation api. In Proceed-
ings of the 2022 ACM SIGSAC Conference on Com-
puter and Communications Security (CCS).
Hong, B., Bae, S., and Kim, Y. (2018). Guti reallocation
demystified: Cellular location tracking with chang-
ing temporary identifier. In 25th Annual Network and
Distributed System Security Symposium (NDSS 2018),
San Diego, California, USA.
Hussain, S. R., Echeverria, M., Chowdhury, O., Li, N., and
Bertino, E. (2019). Privacy attacks to the 4g and 5g
cellular paging protocols using side channel informa-
tion. Network and distributed systems security (NDSS)
symposium2019.
Katz-Bassett, E., John, J. P., Krishnamurthy, A., Wether-
all, D., Anderson, T., and Chawathe, Y. (2006). To-
wards ip geolocation using delay and topology mea-
surements. In ACM Internet Measurement Conference
(IMC ’06), pages 71–84, Rio de Janeiro, Brazil.
Kohls, K. and Diaz, C. (2022). Verloc: Verifiable local-
ization in decentralized systems. In USENIX Security
Symposium (USENIX ’22), Boston, MA, USA.
Kotuliak, M., Erni, S., Leu, P., R
¨
oschlin, M., and Capkun,
S. (2022). Ltrack: Stealthy tracking of mobile phones
in lte. In 31st USENIX Security Symposium (USENIX
Security 22), pages 1291–1306.
Lakshmanan, N., Budhdev, N., Kang, M. S., Chan, M. C.,
and Han, J. (2021). A stealthy location identifi-
cation attack exploiting carrier aggregation in cellu-
lar networks. In 30th USENIX Security Symposium
(USENIX Security 21), pages 3899–3916.
Loch, P. (2019). Whatsapp in the workplace. Accessed
April 2024.
Maar, L., Juffinger, J., Steinbauer, T., Gruss, D., and Man-
gard, S. (2025). Kernelsnitch: Side-channel attacks
on kernel data structures. In Network and Distributed
System Security Symposium 2025: NDSS 2025.
MacKay, D. J. (2003). Information theory, inference and
learning algorithms. Cambridge University Press.
Michalevsky, Y. et al. (2015). Powerspy: Location tracking
using mobile device power analysis. In 24th USENIX
Security Symposium (USENIX Security 15).
Miller, D., Abed Rabho, L., Awondo, P., de Vries, M.,
Duque, M., Garvey, P., Haapio-Kirk, L., Hawkins, C.,
Otaegui, A., Walton, S., et al. (2021). The global
smartphone: Beyond a youth technology. UCL Press.
Nassi, B., Vayner, O., Iluz, E., Nassi, D., Jancar, J., Genkin,
D., and Elovici, Y. (2023). Optical cryptanalysis: Re-
covering cryptographic keys from power led light fluc-
tuations. In Proceedings of the 2023 ACM SIGSAC
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
70