SlideShare una empresa de Scribd logo
1 de 41
Nitisha Desai, Sean Wang and Jiang Zhu

November 23rd, 2011




                                         1
• Privacy in the news

• TaintDroid




                        2
3
• Addresses of websites     • Share with other companies
   •URLS
                            • Verizon will use this information for
   •Search Terms
                                •Business & Marketing Reports
• Location Details              •Making relevant mobile ads

• App and Device usage

• Use of Verizon Products

• Demographic categories
   •Gender
   •Age
   •Sports
   •Frequent Diner




                                                                      4
• “I know where you were and what you are Sharing: Exploiting P2P
  Communications to Invade Users‟ Privacy”
• An attacker can Identify a person, their location and filesharing habits




                                                                             5
6
• Collected children‟s   • “Unsubtantiated   • P2P File Sharing
  personal                and deceptive”      exposed app users‟
  information without                         personal
  parental consent                            information without
                                              authorization
• Violated COPPA




                                                                  7
• Geolocational Privacy and Surveillance Act

• Creates rules to govern the interception and disclosure of geolocation
  information
• Prohibits unlawfully intercepted geolocation information to be used as
  evidence




                                                                           8
• Require companies to tell users when location data is being collected

• Allow the users to decide whether or not to disclose this information to
  third parties




                                                                             9
10
• “With more than 58% of U.S. mobile users worried that their data can be
  easily accessed by others, a privacy policy that helps establish and
  maintain consumer trust is absolutely essential.”
• Create a framework for developers to use to provide clear and functional
  privacy disclosures to consumers who use mobile applications.




                                                                             11
Policy
             maker



              Policy
            Language



  Code
                       Guidance
Resources


                                  12
Authors: William Enck, Peter Gilbert, Byung-Gon Chun, Landon P.Cox,
Jaeyeon Jung, Patrick McDaniel and Anmo N.Sheth.
Slide credits: William Enck, Steven Zittrower



                                                                      13
• What is TaintDroid


• Why it‟s Important


• Implementation


• Costs and Tradeoffs


• Results




                        14
15
GPS/Location Data

Camera/Photos/Microphone

Contacts

SMS Messages

SIM Identifiers (IMSI, ICC-ID, IMEI)
• Goals: Monitor app behavior to determine when privacy sensitive
 information leaves the phone
• Challenges ..
   • Smartphones are resource constrained
   • Third-party applications are entrusted with several types of privacy sensitive
   information
   • Context-based privacy information is dynamic and can be difficult to identify
   even when sent in the clear
   • Applications can share information




                                                                                      18
Dynamic Taint Analysis
        • Dynamic taint analysis is ais a technique that tracks
        1. Dynamic taint analysis technique that tracks the information
              information dependencies from an origin
                dependencies from it origin.

        • Conceptual idea:
         2.       Conceptual Ideas:                             c = t ai nt _sour ce( )
              ‣
             a.     Taint source
                     Taint source
                                                                ...
              ‣
             b.     Taint propagation
                     Taint propagation
             c.       Taint sink                                a = b + c
              ‣ Taint sink
                                                                ...
                                                                net wor k_send( a)


        • Limitations: performance and granularity is a trade-off
ystems and Internet Infrastructure Security Laboratory (SIIS)                             Page 5
                                                                                                   19
20
TaintDroid Architecture map courtesy of
                                                                                         TaintDroid: An Information-Flow…


Interpreted Code




                   Trusted Applications                                Untrusted Applications
                                                                                                                      8

                                                                       Trusted Library
                     Taint Source   1                                                                        Taint Sink

                         2                         3                               6                   7              9



                                                       Taint Map



                                                                       Taint Map
Userspace




                   Dalvik VM                                                                                   Dalvik VM
                   Interpreter                                                                                Interpreter
                                               4
                   Binder IPC Library                                                               Binder IPC Library
                                        Binder Hook                                Binder Hook
                                                                   5
Kernel




                                              Binder Kernel Module




                                                                                                                                 21
‣ Patches state after native method invocation
        ‣ Extends tracking between applications and to storage
                                                                Message-level tracking


                                                 Alci n o
                                                 pi a Ce
                                                  p to d                 M
                                                                         sg        Alci n o
                                                                                   pi a Ce
                                                                                    p to d

                                                Va
                                                it l
                                                ru                                 Va
                                                                                   it l
                                                                                   ru         Variable-level
                                                Mie
                                                an
                                                 ch                                Mie
                                                                                   an
                                                                                    ch        tracking
                                                                                              Method-level
                                                                NvSt m rr s
                                                                a eye L a
                                                                 t
                                                                 i s  i i
                                                                       b e
                                                                                              tracking
                                                                                              File-level
                                                      N o Itr c
                                                      e r nf e
                                                       t k e
                                                       w     a                 So a S a
                                                                               e n r t rg
                                                                                c dy o e
                                                                                              tracking
       • Variables
               Local variables, arguments, class static fields, class instances, and arrays
  • TaintDroid is a firmware modification, not an app
       • Messages
ystems and Internet Infrastructure Security Laboratory (SIIS)                                                  Page 6

               Taint tag is upper bound of tainted variables in message

       • Methods
               Tracks and propagates system provided native libraries

       • Files
               One tag per-file, same logic as messages

                                                                                                                    22
Sources                Sinks
• Low-bandwidth         • Network Calls
  Sensors
                        • File-system Writes
• High-bandwidth
 Sensors
• Information
 Databases
• Devices Identifiers


                                               23
• The authors modified the
 Dalvik VM interpreter to
 store and propagate taint
 tags (a taint bit-vector) on
 variables.
• Local variables and tags:
 taint tags stored adjacent to
 variables on the internal
 execution stack.
   -- 32-bit bitvector with
     each variable

                                 24
• Rules for passing taint
  markers
• α←C : τα←0

• β←α:τβ←τα

• α„←α⊗β:τα←τα∪τβ

• …

• Govern steps 3, 7 of
  TaintDroid Architecture



                            25
26
27
• 14% overall overhead. Smallest for arithmetic and logic operations;
  greatest for string operations
• 4.4% memory overhead




                                                                        28
25                               21.88 MB
                      21.06 MB
                                                   19.48 MB
                                        18.92 MB
20


15
               10.89 ms                                       Android
     8.58 ms                                                  TaintDroid
10


5


0
     App Load Time    Address Book ©    Address Book ®

     27% slower           3.5% more memory

                                                                           29
30%

25%

20%

15%

10%

5%

0%
      App Load   Addres Book Addres Book   Phone Call   Take Picture
        Time       (create)     (read)
        63:65       348:367      101:119     96:106       1718:2216
        (Android: TaintDriod in ms)
                                                                       30
31
• Selected 30 applications with bias on popularity and access to
 Internet, location, microphone, and camera
   • 100 minutes, 22,594 packets, 1,130 TCP connections




• Of 105 flagged TCP connections, only 37 legitimate.

                                                                   32
• 15 of the 30 applications shared physical location with an ad
 server (admob.com, ad.qwapi.com, ads.mobclix.com,
 data.flurry.com)
• Most traffic was plaintext (e.g., AdMob HTTP GET):




• In no case was sharing obvious to user or in EULA
   • In some cases, periodic and occurred without app use



                                                                  33
• 7 applications sent device (IMEI) and 2 apps sent phone
 information (Phone #, IMSI*, ICC-ID) to a remote server without
 informing the user.
   One app‟s EULA indicated the IMEI was sent
   Another app sent the hash of the IMEI




• Frequency was app-specific, e.g., one app sent phone
 information every time the phone booted.
• Appeared to be sent to app developers ...
                                                                   34
35
• Approach Limitations
   • TaintDroid only tracks data flows (i.e. explicit flows).
   • Malicious application can game out TaintDroid and exflitrate privacy sensitive
   information through control flow.

• Taint Source Limitations
   • IMSI contains country (MCC), network (MNC) and Station (MSIN) codes. All
   tainted together, but heavily used in Android for configuration parameters.
   Likely to cause false positives.
   • Network only as sink . Sensitive information can propagate back from
   network.

• Requires custom OS modification. No checks on native libraries

• Lack of evaluation data on power consumption

• User Interface: log is too technical and need further inspection


                                                                                      37
• TaintDroid provides efficient, system-wide, dynamic taint tracking and
  analysis for Android
• 4 granularities of taint propagations
   • Variable-level
   • Message-level
   • Method-level
   • File-level

• 14% performance overhead on a CPU-bound microbenchmark.

• Identified 20 out of the 30 random selected applications to share
  information in a way that was not expected.
• Findings demonstrated the effectiveness and value of enhancing Mobile
  Privacy on smartphone platforms.


                                                                           38
• Real-time tracking, filtering and enforcement

• Eliminate or reduce false-positives through better management of
  variable-level tags
• Integrated with Expert rating system (crowd sourcing)

• Detection of bypass attempts




                                                                     39
• http://appanalysis.org/demo/TaintDroid_controller.swf




                                                          40
nitisha@cmu.edu
sean.wang@sv.cmu.edu
jiang.zhu@sv.cmu.edu




                       41
Thank you.

Más contenido relacionado

Destacado

презентация1
презентация1презентация1
презентация1
Afag Eyubova
 
Amnistia30urte
Amnistia30urteAmnistia30urte
Amnistia30urte
etengabe
 
A study on existing and required facilities or amenities for
A study on existing and required facilities or amenities forA study on existing and required facilities or amenities for
A study on existing and required facilities or amenities for
Alexander Decker
 
Linked data: spreading data over the web
Linked data: spreading data over the webLinked data: spreading data over the web
Linked data: spreading data over the web
shellac
 
Colin Bird. Doosan Babcock. 29th January
Colin Bird. Doosan Babcock. 29th JanuaryColin Bird. Doosan Babcock. 29th January
Colin Bird. Doosan Babcock. 29th January
UKTI2014
 

Destacado (19)

Progetto per la copertura del passante a Torino
Progetto per la copertura del passante a TorinoProgetto per la copertura del passante a Torino
Progetto per la copertura del passante a Torino
 
Thiết kế nhà đẹp, thiết kế nhà phố đẹp
Thiết kế nhà đẹp, thiết kế nhà phố đẹpThiết kế nhà đẹp, thiết kế nhà phố đẹp
Thiết kế nhà đẹp, thiết kế nhà phố đẹp
 
分享無名小站 API
分享無名小站 API分享無名小站 API
分享無名小站 API
 
презентация1
презентация1презентация1
презентация1
 
Amnistia30urte
Amnistia30urteAmnistia30urte
Amnistia30urte
 
моя Кубань
моя Кубаньмоя Кубань
моя Кубань
 
A study on existing and required facilities or amenities for
A study on existing and required facilities or amenities forA study on existing and required facilities or amenities for
A study on existing and required facilities or amenities for
 
Asus x series x751 MA User Manual / User Guide
Asus x series x751 MA User Manual / User GuideAsus x series x751 MA User Manual / User Guide
Asus x series x751 MA User Manual / User Guide
 
Erdogmus sapienza-may2015
Erdogmus sapienza-may2015Erdogmus sapienza-may2015
Erdogmus sapienza-may2015
 
2. Collegio Docenti 12 ottobre
2. Collegio Docenti 12 ottobre2. Collegio Docenti 12 ottobre
2. Collegio Docenti 12 ottobre
 
Tecnologías de Información y Comunicación (TIC)
Tecnologías de Información y Comunicación (TIC)Tecnologías de Información y Comunicación (TIC)
Tecnologías de Información y Comunicación (TIC)
 
Zdrowo i sportowo
Zdrowo i sportowoZdrowo i sportowo
Zdrowo i sportowo
 
ほんの読み方6の法則。
ほんの読み方6の法則。ほんの読み方6の法則。
ほんの読み方6の法則。
 
Analyzing data
Analyzing dataAnalyzing data
Analyzing data
 
Linked data: spreading data over the web
Linked data: spreading data over the webLinked data: spreading data over the web
Linked data: spreading data over the web
 
Förändring av en marknadsföringskurs
Förändring av en marknadsföringskursFörändring av en marknadsföringskurs
Förändring av en marknadsföringskurs
 
Silabus
SilabusSilabus
Silabus
 
Colin Bird. Doosan Babcock. 29th January
Colin Bird. Doosan Babcock. 29th JanuaryColin Bird. Doosan Babcock. 29th January
Colin Bird. Doosan Babcock. 29th January
 
Manual de orientação aos Consumidores - Energia reativa excedente
Manual de orientação aos Consumidores - Energia reativa excedenteManual de orientação aos Consumidores - Energia reativa excedente
Manual de orientação aos Consumidores - Energia reativa excedente
 

Similar a Mobile privacysurvey presentation

Publishing consuming Linked Sensor Data meetup Cuenca
Publishing consuming Linked Sensor Data meetup CuencaPublishing consuming Linked Sensor Data meetup Cuenca
Publishing consuming Linked Sensor Data meetup Cuenca
Jean-Paul Calbimonte
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Ruo Ando
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Ruo_Ando
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
OpenStorageSummit
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
Yury Chemerkin
 

Similar a Mobile privacysurvey presentation (20)

If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
 
AITP Security SIG April 2011
AITP Security SIG April 2011AITP Security SIG April 2011
AITP Security SIG April 2011
 
VMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - OptusVMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - Optus
 
Publishing consuming Linked Sensor Data meetup Cuenca
Publishing consuming Linked Sensor Data meetup CuencaPublishing consuming Linked Sensor Data meetup Cuenca
Publishing consuming Linked Sensor Data meetup Cuenca
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
ICON: Intelligent Container Overlays
ICON: Intelligent Container OverlaysICON: Intelligent Container Overlays
ICON: Intelligent Container Overlays
 
Smarter Computing Big Data
Smarter Computing Big DataSmarter Computing Big Data
Smarter Computing Big Data
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notes
 
Data trustworthiness at the edge
Data trustworthiness at the edgeData trustworthiness at the edge
Data trustworthiness at the edge
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)Linked Sensor Data 101 (FIS2011)
Linked Sensor Data 101 (FIS2011)
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Transforming our Nation’s Information Sharing
Transforming our Nation’s Information SharingTransforming our Nation’s Information Sharing
Transforming our Nation’s Information Sharing
 

Más de Jiang Zhu

Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Jiang Zhu
 
美国云计算发展现状及趋势-2010
美国云计算发展现状及趋势-2010美国云计算发展现状及趋势-2010
美国云计算发展现状及趋势-2010
Jiang Zhu
 
Icccn2011 jiang-0802
Icccn2011 jiang-0802Icccn2011 jiang-0802
Icccn2011 jiang-0802
Jiang Zhu
 

Más de Jiang Zhu (9)

Core of Personalization at Polyvore: Style Profile
Core of Personalization at Polyvore: Style ProfileCore of Personalization at Polyvore: Style Profile
Core of Personalization at Polyvore: Style Profile
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
Art and Science of Web Sites Performance: A Front-end Approach
Art and Science of Web Sites Performance: A Front-end ApproachArt and Science of Web Sites Performance: A Front-end Approach
Art and Science of Web Sites Performance: A Front-end Approach
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
 
Guest Lecture: SenSec - Mobile Security through BehavioMetrics
Guest Lecture: SenSec - Mobile Security through BehavioMetrics Guest Lecture: SenSec - Mobile Security through BehavioMetrics
Guest Lecture: SenSec - Mobile Security through BehavioMetrics
 
ICNC 2013 SenSec Presentation
ICNC 2013 SenSec PresentationICNC 2013 SenSec Presentation
ICNC 2013 SenSec Presentation
 
BehavioMetrics: A Big Data Approach
BehavioMetrics: A Big Data ApproachBehavioMetrics: A Big Data Approach
BehavioMetrics: A Big Data Approach
 
美国云计算发展现状及趋势-2010
美国云计算发展现状及趋势-2010美国云计算发展现状及趋势-2010
美国云计算发展现状及趋势-2010
 
Icccn2011 jiang-0802
Icccn2011 jiang-0802Icccn2011 jiang-0802
Icccn2011 jiang-0802
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Mobile privacysurvey presentation

  • 1. Nitisha Desai, Sean Wang and Jiang Zhu November 23rd, 2011 1
  • 2. • Privacy in the news • TaintDroid 2
  • 3. 3
  • 4. • Addresses of websites • Share with other companies •URLS • Verizon will use this information for •Search Terms •Business & Marketing Reports • Location Details •Making relevant mobile ads • App and Device usage • Use of Verizon Products • Demographic categories •Gender •Age •Sports •Frequent Diner 4
  • 5. • “I know where you were and what you are Sharing: Exploiting P2P Communications to Invade Users‟ Privacy” • An attacker can Identify a person, their location and filesharing habits 5
  • 6. 6
  • 7. • Collected children‟s • “Unsubtantiated • P2P File Sharing personal and deceptive” exposed app users‟ information without personal parental consent information without authorization • Violated COPPA 7
  • 8. • Geolocational Privacy and Surveillance Act • Creates rules to govern the interception and disclosure of geolocation information • Prohibits unlawfully intercepted geolocation information to be used as evidence 8
  • 9. • Require companies to tell users when location data is being collected • Allow the users to decide whether or not to disclose this information to third parties 9
  • 10. 10
  • 11. • “With more than 58% of U.S. mobile users worried that their data can be easily accessed by others, a privacy policy that helps establish and maintain consumer trust is absolutely essential.” • Create a framework for developers to use to provide clear and functional privacy disclosures to consumers who use mobile applications. 11
  • 12. Policy maker Policy Language Code Guidance Resources 12
  • 13. Authors: William Enck, Peter Gilbert, Byung-Gon Chun, Landon P.Cox, Jaeyeon Jung, Patrick McDaniel and Anmo N.Sheth. Slide credits: William Enck, Steven Zittrower 13
  • 14. • What is TaintDroid • Why it‟s Important • Implementation • Costs and Tradeoffs • Results 14
  • 15. 15
  • 17.
  • 18. • Goals: Monitor app behavior to determine when privacy sensitive information leaves the phone • Challenges .. • Smartphones are resource constrained • Third-party applications are entrusted with several types of privacy sensitive information • Context-based privacy information is dynamic and can be difficult to identify even when sent in the clear • Applications can share information 18
  • 19. Dynamic Taint Analysis • Dynamic taint analysis is ais a technique that tracks 1. Dynamic taint analysis technique that tracks the information information dependencies from an origin dependencies from it origin. • Conceptual idea: 2. Conceptual Ideas: c = t ai nt _sour ce( ) ‣ a. Taint source Taint source ... ‣ b. Taint propagation Taint propagation c. Taint sink a = b + c ‣ Taint sink ... net wor k_send( a) • Limitations: performance and granularity is a trade-off ystems and Internet Infrastructure Security Laboratory (SIIS) Page 5 19
  • 20. 20
  • 21. TaintDroid Architecture map courtesy of TaintDroid: An Information-Flow… Interpreted Code Trusted Applications Untrusted Applications 8 Trusted Library Taint Source 1 Taint Sink 2 3 6 7 9 Taint Map Taint Map Userspace Dalvik VM Dalvik VM Interpreter Interpreter 4 Binder IPC Library Binder IPC Library Binder Hook Binder Hook 5 Kernel Binder Kernel Module 21
  • 22. ‣ Patches state after native method invocation ‣ Extends tracking between applications and to storage Message-level tracking Alci n o pi a Ce p to d M sg Alci n o pi a Ce p to d Va it l ru Va it l ru Variable-level Mie an ch Mie an ch tracking Method-level NvSt m rr s a eye L a t i s i i b e tracking File-level N o Itr c e r nf e t k e w a So a S a e n r t rg c dy o e tracking • Variables Local variables, arguments, class static fields, class instances, and arrays • TaintDroid is a firmware modification, not an app • Messages ystems and Internet Infrastructure Security Laboratory (SIIS) Page 6 Taint tag is upper bound of tainted variables in message • Methods Tracks and propagates system provided native libraries • Files One tag per-file, same logic as messages 22
  • 23. Sources Sinks • Low-bandwidth • Network Calls Sensors • File-system Writes • High-bandwidth Sensors • Information Databases • Devices Identifiers 23
  • 24. • The authors modified the Dalvik VM interpreter to store and propagate taint tags (a taint bit-vector) on variables. • Local variables and tags: taint tags stored adjacent to variables on the internal execution stack. -- 32-bit bitvector with each variable 24
  • 25. • Rules for passing taint markers • α←C : τα←0 • β←α:τβ←τα • α„←α⊗β:τα←τα∪τβ • … • Govern steps 3, 7 of TaintDroid Architecture 25
  • 26. 26
  • 27. 27
  • 28. • 14% overall overhead. Smallest for arithmetic and logic operations; greatest for string operations • 4.4% memory overhead 28
  • 29. 25 21.88 MB 21.06 MB 19.48 MB 18.92 MB 20 15 10.89 ms Android 8.58 ms TaintDroid 10 5 0 App Load Time Address Book © Address Book ® 27% slower 3.5% more memory 29
  • 30. 30% 25% 20% 15% 10% 5% 0% App Load Addres Book Addres Book Phone Call Take Picture Time (create) (read) 63:65 348:367 101:119 96:106 1718:2216 (Android: TaintDriod in ms) 30
  • 31. 31
  • 32. • Selected 30 applications with bias on popularity and access to Internet, location, microphone, and camera • 100 minutes, 22,594 packets, 1,130 TCP connections • Of 105 flagged TCP connections, only 37 legitimate. 32
  • 33. • 15 of the 30 applications shared physical location with an ad server (admob.com, ad.qwapi.com, ads.mobclix.com, data.flurry.com) • Most traffic was plaintext (e.g., AdMob HTTP GET): • In no case was sharing obvious to user or in EULA • In some cases, periodic and occurred without app use 33
  • 34. • 7 applications sent device (IMEI) and 2 apps sent phone information (Phone #, IMSI*, ICC-ID) to a remote server without informing the user. One app‟s EULA indicated the IMEI was sent Another app sent the hash of the IMEI • Frequency was app-specific, e.g., one app sent phone information every time the phone booted. • Appeared to be sent to app developers ... 34
  • 35. 35
  • 36. • Approach Limitations • TaintDroid only tracks data flows (i.e. explicit flows). • Malicious application can game out TaintDroid and exflitrate privacy sensitive information through control flow. • Taint Source Limitations • IMSI contains country (MCC), network (MNC) and Station (MSIN) codes. All tainted together, but heavily used in Android for configuration parameters. Likely to cause false positives. • Network only as sink . Sensitive information can propagate back from network. • Requires custom OS modification. No checks on native libraries • Lack of evaluation data on power consumption • User Interface: log is too technical and need further inspection 37
  • 37. • TaintDroid provides efficient, system-wide, dynamic taint tracking and analysis for Android • 4 granularities of taint propagations • Variable-level • Message-level • Method-level • File-level • 14% performance overhead on a CPU-bound microbenchmark. • Identified 20 out of the 30 random selected applications to share information in a way that was not expected. • Findings demonstrated the effectiveness and value of enhancing Mobile Privacy on smartphone platforms. 38
  • 38. • Real-time tracking, filtering and enforcement • Eliminate or reduce false-positives through better management of variable-level tags • Integrated with Expert rating system (crowd sourcing) • Detection of bypass attempts 39